<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Updates on Freexian</title>
    <link>https://www.freexian.com/fr/lts/extended/updates/</link>
    <description>Recent content in Updates on Freexian</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>fr</language>
    <lastBuildDate>Thu, 17 Sep 2020 11:07:07 +0200</lastBuildDate><atom:link href="https://www.freexian.com/fr/lts/extended/updates/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>ELA-1656-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1656-1-gimp/</link>
      <pubDate>Sat, 14 Mar 2026 18:38:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1656-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1656-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u9 (stretch), 2.10.8-2&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-0797&#34;&gt;CVE-2026-0797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2044&#34;&gt;CVE-2026-2044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2045&#34;&gt;CVE-2026-2045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2048&#34;&gt;CVE-2026-2048&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in GIMP, the GNU Image
Manipulation Program, which could result in denial of service or
potentially the execution of arbitrary code if malformed XWD, ICNS, PGM
or ICO files are opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1655-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1655-1-openjdk-8/</link>
      <pubDate>Thu, 05 Mar 2026 11:00:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1655-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1655-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u482-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21925&#34;&gt;CVE-2026-21925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21932&#34;&gt;CVE-2026-21932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21933&#34;&gt;CVE-2026-21933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21945&#34;&gt;CVE-2026-21945&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in incorrect certificate validation,
CRLF injection or man-in-the-middle attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1654-1 python-tornado security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1654-1-python-tornado/</link>
      <pubDate>Sun, 01 Mar 2026 00:50:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1654-1-python-tornado/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1654-1-python-tornado/">
      
&lt;p&gt;Package : python-tornado&lt;/p&gt;


&lt;p&gt;Version : 4.4.3-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47287&#34;&gt;CVE-2025-47287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67724&#34;&gt;CVE-2025-67724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67725&#34;&gt;CVE-2025-67725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67726&#34;&gt;CVE-2025-67726&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in python-tornado, a scalable,
non-blocking Python web framework and asynchronous networking library.&lt;/p&gt;
&lt;p&gt;CVE-2025-47287&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When Tornado&#39;s &#39;multipart/form-data&#39; parser encounters certain errors,
it logs a warning but continues trying to parse the remainder of the
data. This allows remote attackers to generate an extremely high volume
of logs, constituting a DoS attack. This DoS is compounded by the fact
that the logging subsystem is synchronous.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-67724&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Custom reason phrases can cause multiple vulnerabilities (like XSS,
header injection, ...) due to being used unescaped in HTTP headers.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-67725&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A single maliciously crafted HTTP request can cause a possible DoS
due to quadratic performance of repeated header lines.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-67726&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An inefficient algorithm when parsing parameters for HTTP header
values can potentially cause a DoS.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1652-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1652-1-glib2.0/</link>
      <pubDate>Sat, 28 Feb 2026 08:10:20 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1652-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1652-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.50.3-2&amp;#43;deb9u9 (stretch), 2.58.3-2&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-0988&#34;&gt;CVE-2026-0988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1484&#34;&gt;CVE-2026-1484&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1485&#34;&gt;CVE-2026-1485&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1489&#34;&gt;CVE-2026-1489&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in GLib, a general-purpose, portable utility
library, that could lead to denial of service, memory corruption or
potentially arbitrary code execution if maliciously crafted data is
processed.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2026-0988&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Codean Labs found missing validation of offset and count parameters in the
&lt;code&gt;g_buffered_input_stream_peek()&lt;/code&gt; function can lead to an integer overflow
during length calculation. When specially crafted values are provided, this
overflow results in an incorrect size being passed to memcpy(), triggering
a buffer overflow. This can cause application crashes, leading to a Denial
of Service (DoS).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2026-1484&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;treeplus, with additional thanks to Sovereign Tech Resilience program of the
Sovereign Tech Agency, found a flaw in the GLib Base64 encoding routine when
processing very large input data. Due to incorrect use of integer types
during length calculation, the library may miscalculate buffer boundaries.
This can cause memory writes outside the allocated buffer. Applications
that process untrusted or extremely large Base64 input using GLib may crash
or behave unpredictably.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2026-1485&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;treeplus, with additonal thanks to Sovereign Tech Resilience program of the
Sovereign Tech Agency, found a flaw in Glib&amp;rsquo;s content type parsing logic.
This buffer underflow vulnerability occurs because the length of a header
line is stored in a signed integer, which can lead to integer wraparound
for very large inputs. This results in pointer underflow and out-of-bounds
memory access. Exploitation requires a local user to install or
process a specially crafted treemagic file, which can lead to local
denial of service or application instability.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2026-1489&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;treeplus, with additional thanks to Sovereign Tech Resilience program of the
Sovereign Tech Agency, found a flaw in GLib. An integer overflow
vulnerability in its Unicode case conversion implementation can lead to
memory corruption. By processing specially crafted and extremely large
Unicode strings, an attacker could trigger an undersized memory allocation,
resulting in out-of-bounds writes. This could cause applications utilizing
GLib for string conversion to crash or become unstable.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1653-1 gnutls28 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1653-1-gnutls28/</link>
      <pubDate>Fri, 27 Feb 2026 08:36:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1653-1-gnutls28/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1653-1-gnutls28/">
      
&lt;p&gt;Package : gnutls28&lt;/p&gt;


&lt;p&gt;Version : 3.5.8-5&amp;#43;deb9u10 (stretch), 3.6.7-4&amp;#43;deb10u15 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9820&#34;&gt;CVE-2025-9820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14831&#34;&gt;CVE-2025-14831&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities were found in GnuTLS, a portable library which
implements the Transport Layer Security and Datagram Transport Layer
Security protocols, which may lead to Denial of Service.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2025-9820&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;An out-of-bound write issue was discovered when a PKCS#11 token is
initialized with the &lt;code&gt;gnutls_pkcs11_token_init()&lt;/code&gt; function and it is
passed a token label longer than 32 characters.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-14831&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Scheckenbach discovered that verifying specially crafted
malicious certificates containing a large number of name constraints
and subject alternative names (SANs) could lead to resource
exhaustion.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1651-1 modsecurity-crs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1651-1-modsecurity-crs/</link>
      <pubDate>Sun, 22 Feb 2026 11:14:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1651-1-modsecurity-crs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1651-1-modsecurity-crs/">
      
&lt;p&gt;Package : modsecurity-crs&lt;/p&gt;


&lt;p&gt;Version : 3.2.3-0&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38199&#34;&gt;CVE-2023-38199&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A issue has been fixed in modsecurity-crs, a set of generic attack detection rules for use with ModSecurity.&lt;/p&gt;
&lt;p&gt;CVE-2023-38199&lt;/p&gt;
&lt;p&gt;Coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka &amp;ldquo;Content-Type confusion&amp;rdquo; between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1650-1 gegl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1650-1-gegl/</link>
      <pubDate>Sat, 21 Feb 2026 18:55:06 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1650-1-gegl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1650-1-gegl/">
      
&lt;p&gt;Package : gegl&lt;/p&gt;


&lt;p&gt;Version : 0.3.8-4&amp;#43;deb9u2 (stretch), 0.4.12-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2049&#34;&gt;CVE-2026-2049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2050&#34;&gt;CVE-2026-2050&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A heap-based buffer overflow was discovered in the RGBE/HDR parser of
GEGL, a graph-based image processing library, which could result in
denial of service or the execution of arbitrary code if malformed files
are processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1649-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1649-1-gimp/</link>
      <pubDate>Fri, 20 Feb 2026 18:40:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1649-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1649-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u8 (stretch), 2.10.8-2&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2239&#34;&gt;CVE-2026-2239&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2271&#34;&gt;CVE-2026-2271&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-2272&#34;&gt;CVE-2026-2272&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in GIMP, the GNU Image
Manipulation Program, which could result in denial of service or
potentially the execution of arbitrary code if malformed PSD, PSP or ICO
files are opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1648-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1648-1-python-django/</link>
      <pubDate>Thu, 19 Feb 2026 11:48:22 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1648-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1648-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u30 (stretch), 1:1.11.29-1&amp;#43;deb10u19 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-13473&#34;&gt;CVE-2025-13473&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1207&#34;&gt;CVE-2026-1207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1285&#34;&gt;CVE-2026-1285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1287&#34;&gt;CVE-2026-1287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1312&#34;&gt;CVE-2026-1312&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were multiple vulnerabilities in Django, the Python-based web-development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-13473: The &lt;code&gt;check_password&lt;/code&gt; function in &lt;code&gt;django.contrib.auth.handlers.modwsgi&lt;/code&gt; for authentication via &lt;code&gt;mod_wsgi&lt;/code&gt; allowed remote attackers to enumerate users via a timing attack.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-1207: Raster lookups on &lt;code&gt;RasterField&lt;/code&gt; (only implemented on PostGIS) allowed remote attackers to inject SQL via the band index parameter.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-1285: The &lt;code&gt;django.utils.text.Truncator.chars()&lt;/code&gt; and &lt;code&gt;Truncator.words()&lt;/code&gt; methods (with &lt;code&gt;html=True&lt;/code&gt;) and the &lt;code&gt;truncatechars_html&lt;/code&gt; and &lt;code&gt;truncatewords_html&lt;/code&gt; template filters allowed a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-1287: &lt;code&gt;FilteredRelation&lt;/code&gt; was subject to SQL injection in column aliases via control characters using a suitably crafted dictionary, with dictionary expansion, as the &lt;code&gt;**kwargs&lt;/code&gt; passed to &lt;code&gt;QuerySet&lt;/code&gt; methods &lt;code&gt;annotate()&lt;/code&gt;, &lt;code&gt;aggregate()&lt;/code&gt;, &lt;code&gt;extra()&lt;/code&gt;, &lt;code&gt;values()&lt;/code&gt;, &lt;code&gt;values_list()&lt;/code&gt; and &lt;code&gt;alias()&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-1312: &lt;code&gt;QuerySet.order_by()&lt;/code&gt; was subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in &lt;code&gt;FilteredRelation&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition, The fix for CVE-2025-6069 in the &lt;code&gt;python3.9&lt;/code&gt; source package which modified the &lt;code&gt;html.parser.HTMLParser&lt;/code&gt; class in such a way that changed the behaviour of Django&amp;rsquo;s &lt;code&gt;strip_tags()&lt;/code&gt; method in some edge cases that were tested by Django&amp;rsquo;s testsuite. As a result of this regression, we have updated the testsuite for the new expected results.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1647-1 libpng1.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1647-1-libpng1.6/</link>
      <pubDate>Tue, 17 Feb 2026 19:34:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1647-1-libpng1.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1647-1-libpng1.6/">
      
&lt;p&gt;Package : libpng1.6&lt;/p&gt;


&lt;p&gt;Version : 1.6.28-1&amp;#43;deb9u3 (stretch), 1.6.36-6&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22695&#34;&gt;CVE-2026-22695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22801&#34;&gt;CVE-2026-22801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-25646&#34;&gt;CVE-2026-25646&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties have been found in libpng, the official PNG reference library, potentially allowing information disclosure via out-of-bounds read or denial of service via infinite loop.&lt;/p&gt;
&lt;p&gt;CVE-2026-22695&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2026-22801&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2026-25646&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and  the number of colors in the palette is more than twice the maximum supported by the user&#39;s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1646-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1646-1-wireshark/</link>
      <pubDate>Mon, 16 Feb 2026 14:58:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1646-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1646-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 2.6.20-0&amp;#43;deb10u9~deb9u2 (stretch), 2.6.20-0&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9781&#34;&gt;CVE-2024-9781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11596&#34;&gt;CVE-2024-11596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5601&#34;&gt;CVE-2025-5601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-11626&#34;&gt;CVE-2025-11626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-13946&#34;&gt;CVE-2025-13946&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the network traffic analyzer Wireshark.&lt;/p&gt;
&lt;p&gt;CVE-2024-9781&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;AppleTalk and RELOAD Framing dissector crash allows denial of service via packet injection or crafted capture file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-11596&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ECMP dissector crash allows denial of service via packet injection or crafted capture file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-5601&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Column handling crashes allows denial of service via packet injection or crafted capture file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-11626&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MONGO dissector infinite loop allows denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-13946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MEGACO dissector infinite loop in allows denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1645-1 clamav new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1645-1-clamav/</link>
      <pubDate>Fri, 13 Feb 2026 16:40:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1645-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1645-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 1.4.3&amp;#43;dfsg-1~deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;The 1.0 version of ClamAV, an anti-virus utility for Unix, had recently
been discontinued upstream, and was set to no longer accept signature
updates on November 28, 2026. This update brings ClamAV 1.4 to buster,
extending the upstream support.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1644-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1644-1-linux-5.10/</link>
      <pubDate>Fri, 13 Feb 2026 16:07:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1644-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1644-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.249-1~deb9u1 (stretch), 5.10.249-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48744&#34;&gt;CVE-2022-48744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49168&#34;&gt;CVE-2022-49168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49465&#34;&gt;CVE-2022-49465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49711&#34;&gt;CVE-2022-49711&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49743&#34;&gt;CVE-2022-49743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52975&#34;&gt;CVE-2023-52975&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-54207&#34;&gt;CVE-2023-54207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-54321&#34;&gt;CVE-2023-54321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36903&#34;&gt;CVE-2024-36903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36927&#34;&gt;CVE-2024-36927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22022&#34;&gt;CVE-2025-22022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22121&#34;&gt;CVE-2025-22121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37830&#34;&gt;CVE-2025-37830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38022&#34;&gt;CVE-2025-38022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38119&#34;&gt;CVE-2025-38119&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38556&#34;&gt;CVE-2025-38556&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38591&#34;&gt;CVE-2025-38591&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39702&#34;&gt;CVE-2025-39702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40110&#34;&gt;CVE-2025-40110&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40215&#34;&gt;CVE-2025-40215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68211&#34;&gt;CVE-2025-68211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68255&#34;&gt;CVE-2025-68255&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68257&#34;&gt;CVE-2025-68257&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68258&#34;&gt;CVE-2025-68258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68261&#34;&gt;CVE-2025-68261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68264&#34;&gt;CVE-2025-68264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68266&#34;&gt;CVE-2025-68266&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68282&#34;&gt;CVE-2025-68282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68325&#34;&gt;CVE-2025-68325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68332&#34;&gt;CVE-2025-68332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68336&#34;&gt;CVE-2025-68336&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68337&#34;&gt;CVE-2025-68337&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68344&#34;&gt;CVE-2025-68344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68346&#34;&gt;CVE-2025-68346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68349&#34;&gt;CVE-2025-68349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68354&#34;&gt;CVE-2025-68354&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68362&#34;&gt;CVE-2025-68362&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68364&#34;&gt;CVE-2025-68364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68366&#34;&gt;CVE-2025-68366&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68367&#34;&gt;CVE-2025-68367&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68372&#34;&gt;CVE-2025-68372&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68724&#34;&gt;CVE-2025-68724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68725&#34;&gt;CVE-2025-68725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68733&#34;&gt;CVE-2025-68733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68740&#34;&gt;CVE-2025-68740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68757&#34;&gt;CVE-2025-68757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68758&#34;&gt;CVE-2025-68758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68759&#34;&gt;CVE-2025-68759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68764&#34;&gt;CVE-2025-68764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68767&#34;&gt;CVE-2025-68767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68769&#34;&gt;CVE-2025-68769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68771&#34;&gt;CVE-2025-68771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68773&#34;&gt;CVE-2025-68773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68774&#34;&gt;CVE-2025-68774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68776&#34;&gt;CVE-2025-68776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68777&#34;&gt;CVE-2025-68777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68782&#34;&gt;CVE-2025-68782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68783&#34;&gt;CVE-2025-68783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68785&#34;&gt;CVE-2025-68785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68787&#34;&gt;CVE-2025-68787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68788&#34;&gt;CVE-2025-68788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68795&#34;&gt;CVE-2025-68795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68796&#34;&gt;CVE-2025-68796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68797&#34;&gt;CVE-2025-68797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68799&#34;&gt;CVE-2025-68799&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68800&#34;&gt;CVE-2025-68800&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68801&#34;&gt;CVE-2025-68801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68803&#34;&gt;CVE-2025-68803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68804&#34;&gt;CVE-2025-68804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68808&#34;&gt;CVE-2025-68808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68813&#34;&gt;CVE-2025-68813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68815&#34;&gt;CVE-2025-68815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68816&#34;&gt;CVE-2025-68816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68818&#34;&gt;CVE-2025-68818&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68819&#34;&gt;CVE-2025-68819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68820&#34;&gt;CVE-2025-68820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71064&#34;&gt;CVE-2025-71064&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71066&#34;&gt;CVE-2025-71066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71069&#34;&gt;CVE-2025-71069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71075&#34;&gt;CVE-2025-71075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71077&#34;&gt;CVE-2025-71077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71079&#34;&gt;CVE-2025-71079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71084&#34;&gt;CVE-2025-71084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71085&#34;&gt;CVE-2025-71085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71086&#34;&gt;CVE-2025-71086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71087&#34;&gt;CVE-2025-71087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71091&#34;&gt;CVE-2025-71091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71093&#34;&gt;CVE-2025-71093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71096&#34;&gt;CVE-2025-71096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71097&#34;&gt;CVE-2025-71097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71098&#34;&gt;CVE-2025-71098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71102&#34;&gt;CVE-2025-71102&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71104&#34;&gt;CVE-2025-71104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71105&#34;&gt;CVE-2025-71105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71108&#34;&gt;CVE-2025-71108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71111&#34;&gt;CVE-2025-71111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71112&#34;&gt;CVE-2025-71112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71113&#34;&gt;CVE-2025-71113&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71114&#34;&gt;CVE-2025-71114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71116&#34;&gt;CVE-2025-71116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71118&#34;&gt;CVE-2025-71118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71120&#34;&gt;CVE-2025-71120&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71123&#34;&gt;CVE-2025-71123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71125&#34;&gt;CVE-2025-71125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71127&#34;&gt;CVE-2025-71127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71131&#34;&gt;CVE-2025-71131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71136&#34;&gt;CVE-2025-71136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71137&#34;&gt;CVE-2025-71137&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71154&#34;&gt;CVE-2025-71154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71162&#34;&gt;CVE-2025-71162&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71182&#34;&gt;CVE-2025-71182&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71185&#34;&gt;CVE-2025-71185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71186&#34;&gt;CVE-2025-71186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71190&#34;&gt;CVE-2025-71190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71191&#34;&gt;CVE-2025-71191&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71194&#34;&gt;CVE-2025-71194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71196&#34;&gt;CVE-2025-71196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71197&#34;&gt;CVE-2025-71197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71199&#34;&gt;CVE-2025-71199&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22976&#34;&gt;CVE-2026-22976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22977&#34;&gt;CVE-2026-22977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22978&#34;&gt;CVE-2026-22978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22980&#34;&gt;CVE-2026-22980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22990&#34;&gt;CVE-2026-22990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22991&#34;&gt;CVE-2026-22991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22997&#34;&gt;CVE-2026-22997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22998&#34;&gt;CVE-2026-22998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22999&#34;&gt;CVE-2026-22999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23001&#34;&gt;CVE-2026-23001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23003&#34;&gt;CVE-2026-23003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23011&#34;&gt;CVE-2026-23011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23020&#34;&gt;CVE-2026-23020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23021&#34;&gt;CVE-2026-23021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23033&#34;&gt;CVE-2026-23033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23038&#34;&gt;CVE-2026-23038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23047&#34;&gt;CVE-2026-23047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23049&#34;&gt;CVE-2026-23049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23056&#34;&gt;CVE-2026-23056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23058&#34;&gt;CVE-2026-23058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23060&#34;&gt;CVE-2026-23060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23061&#34;&gt;CVE-2026-23061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23063&#34;&gt;CVE-2026-23063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23064&#34;&gt;CVE-2026-23064&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23071&#34;&gt;CVE-2026-23071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23073&#34;&gt;CVE-2026-23073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23074&#34;&gt;CVE-2026-23074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23075&#34;&gt;CVE-2026-23075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23076&#34;&gt;CVE-2026-23076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23080&#34;&gt;CVE-2026-23080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23083&#34;&gt;CVE-2026-23083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23084&#34;&gt;CVE-2026-23084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23085&#34;&gt;CVE-2026-23085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23087&#34;&gt;CVE-2026-23087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23089&#34;&gt;CVE-2026-23089&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23090&#34;&gt;CVE-2026-23090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23091&#34;&gt;CVE-2026-23091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23095&#34;&gt;CVE-2026-23095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23096&#34;&gt;CVE-2026-23096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23097&#34;&gt;CVE-2026-23097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23098&#34;&gt;CVE-2026-23098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23101&#34;&gt;CVE-2026-23101&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23103&#34;&gt;CVE-2026-23103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23105&#34;&gt;CVE-2026-23105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23108&#34;&gt;CVE-2026-23108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23110&#34;&gt;CVE-2026-23110&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1643-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1643-1-linux-6.1/</link>
      <pubDate>Fri, 13 Feb 2026 14:32:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1643-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1643-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.162-1~deb9u1 (stretch), 6.1.162-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52658&#34;&gt;CVE-2023-52658&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-53421&#34;&gt;CVE-2023-53421&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-54285&#34;&gt;CVE-2023-54285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42079&#34;&gt;CVE-2024-42079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46786&#34;&gt;CVE-2024-46786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49968&#34;&gt;CVE-2024-49968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21946&#34;&gt;CVE-2025-21946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22022&#34;&gt;CVE-2025-22022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22083&#34;&gt;CVE-2025-22083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22090&#34;&gt;CVE-2025-22090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22107&#34;&gt;CVE-2025-22107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22111&#34;&gt;CVE-2025-22111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22121&#34;&gt;CVE-2025-22121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37926&#34;&gt;CVE-2025-37926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38022&#34;&gt;CVE-2025-38022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38104&#34;&gt;CVE-2025-38104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38125&#34;&gt;CVE-2025-38125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38129&#34;&gt;CVE-2025-38129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38232&#34;&gt;CVE-2025-38232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38361&#34;&gt;CVE-2025-38361&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38408&#34;&gt;CVE-2025-38408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38591&#34;&gt;CVE-2025-38591&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38718&#34;&gt;CVE-2025-38718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39721&#34;&gt;CVE-2025-39721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39871&#34;&gt;CVE-2025-39871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40039&#34;&gt;CVE-2025-40039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40110&#34;&gt;CVE-2025-40110&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40149&#34;&gt;CVE-2025-40149&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40164&#34;&gt;CVE-2025-40164&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40215&#34;&gt;CVE-2025-40215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68211&#34;&gt;CVE-2025-68211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68223&#34;&gt;CVE-2025-68223&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68254&#34;&gt;CVE-2025-68254&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68255&#34;&gt;CVE-2025-68255&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68256&#34;&gt;CVE-2025-68256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68257&#34;&gt;CVE-2025-68257&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68258&#34;&gt;CVE-2025-68258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68259&#34;&gt;CVE-2025-68259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68261&#34;&gt;CVE-2025-68261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68263&#34;&gt;CVE-2025-68263&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68264&#34;&gt;CVE-2025-68264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68266&#34;&gt;CVE-2025-68266&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68291&#34;&gt;CVE-2025-68291&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68325&#34;&gt;CVE-2025-68325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68332&#34;&gt;CVE-2025-68332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68335&#34;&gt;CVE-2025-68335&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68336&#34;&gt;CVE-2025-68336&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68337&#34;&gt;CVE-2025-68337&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68340&#34;&gt;CVE-2025-68340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68344&#34;&gt;CVE-2025-68344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68345&#34;&gt;CVE-2025-68345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68346&#34;&gt;CVE-2025-68346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68347&#34;&gt;CVE-2025-68347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68349&#34;&gt;CVE-2025-68349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68354&#34;&gt;CVE-2025-68354&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68362&#34;&gt;CVE-2025-68362&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68363&#34;&gt;CVE-2025-68363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68364&#34;&gt;CVE-2025-68364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68365&#34;&gt;CVE-2025-68365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68366&#34;&gt;CVE-2025-68366&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68367&#34;&gt;CVE-2025-68367&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68369&#34;&gt;CVE-2025-68369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68371&#34;&gt;CVE-2025-68371&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68372&#34;&gt;CVE-2025-68372&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68380&#34;&gt;CVE-2025-68380&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68724&#34;&gt;CVE-2025-68724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68725&#34;&gt;CVE-2025-68725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68727&#34;&gt;CVE-2025-68727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68728&#34;&gt;CVE-2025-68728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68732&#34;&gt;CVE-2025-68732&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68733&#34;&gt;CVE-2025-68733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68740&#34;&gt;CVE-2025-68740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68742&#34;&gt;CVE-2025-68742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68746&#34;&gt;CVE-2025-68746&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68753&#34;&gt;CVE-2025-68753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68757&#34;&gt;CVE-2025-68757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68758&#34;&gt;CVE-2025-68758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68759&#34;&gt;CVE-2025-68759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68764&#34;&gt;CVE-2025-68764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68765&#34;&gt;CVE-2025-68765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68766&#34;&gt;CVE-2025-68766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68767&#34;&gt;CVE-2025-68767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68769&#34;&gt;CVE-2025-68769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68771&#34;&gt;CVE-2025-68771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68772&#34;&gt;CVE-2025-68772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68773&#34;&gt;CVE-2025-68773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68774&#34;&gt;CVE-2025-68774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68776&#34;&gt;CVE-2025-68776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68777&#34;&gt;CVE-2025-68777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68778&#34;&gt;CVE-2025-68778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68780&#34;&gt;CVE-2025-68780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68781&#34;&gt;CVE-2025-68781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68782&#34;&gt;CVE-2025-68782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68783&#34;&gt;CVE-2025-68783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68785&#34;&gt;CVE-2025-68785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68786&#34;&gt;CVE-2025-68786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68787&#34;&gt;CVE-2025-68787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68788&#34;&gt;CVE-2025-68788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68795&#34;&gt;CVE-2025-68795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68796&#34;&gt;CVE-2025-68796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68797&#34;&gt;CVE-2025-68797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68798&#34;&gt;CVE-2025-68798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68799&#34;&gt;CVE-2025-68799&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68800&#34;&gt;CVE-2025-68800&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68801&#34;&gt;CVE-2025-68801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68803&#34;&gt;CVE-2025-68803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68804&#34;&gt;CVE-2025-68804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68806&#34;&gt;CVE-2025-68806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68808&#34;&gt;CVE-2025-68808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68813&#34;&gt;CVE-2025-68813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68814&#34;&gt;CVE-2025-68814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68815&#34;&gt;CVE-2025-68815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68816&#34;&gt;CVE-2025-68816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68817&#34;&gt;CVE-2025-68817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68818&#34;&gt;CVE-2025-68818&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68819&#34;&gt;CVE-2025-68819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68820&#34;&gt;CVE-2025-68820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68821&#34;&gt;CVE-2025-68821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71064&#34;&gt;CVE-2025-71064&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71066&#34;&gt;CVE-2025-71066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71069&#34;&gt;CVE-2025-71069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71071&#34;&gt;CVE-2025-71071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71075&#34;&gt;CVE-2025-71075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71077&#34;&gt;CVE-2025-71077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71078&#34;&gt;CVE-2025-71078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71079&#34;&gt;CVE-2025-71079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71081&#34;&gt;CVE-2025-71081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71082&#34;&gt;CVE-2025-71082&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71083&#34;&gt;CVE-2025-71083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71084&#34;&gt;CVE-2025-71084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71085&#34;&gt;CVE-2025-71085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71086&#34;&gt;CVE-2025-71086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71087&#34;&gt;CVE-2025-71087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71088&#34;&gt;CVE-2025-71088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71091&#34;&gt;CVE-2025-71091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71093&#34;&gt;CVE-2025-71093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71094&#34;&gt;CVE-2025-71094&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71095&#34;&gt;CVE-2025-71095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71096&#34;&gt;CVE-2025-71096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71097&#34;&gt;CVE-2025-71097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71098&#34;&gt;CVE-2025-71098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71102&#34;&gt;CVE-2025-71102&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71104&#34;&gt;CVE-2025-71104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71105&#34;&gt;CVE-2025-71105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71108&#34;&gt;CVE-2025-71108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71111&#34;&gt;CVE-2025-71111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71112&#34;&gt;CVE-2025-71112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71113&#34;&gt;CVE-2025-71113&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71114&#34;&gt;CVE-2025-71114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71116&#34;&gt;CVE-2025-71116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71118&#34;&gt;CVE-2025-71118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71119&#34;&gt;CVE-2025-71119&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71120&#34;&gt;CVE-2025-71120&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71121&#34;&gt;CVE-2025-71121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71123&#34;&gt;CVE-2025-71123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71125&#34;&gt;CVE-2025-71125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71126&#34;&gt;CVE-2025-71126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71127&#34;&gt;CVE-2025-71127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71130&#34;&gt;CVE-2025-71130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71131&#34;&gt;CVE-2025-71131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71132&#34;&gt;CVE-2025-71132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71133&#34;&gt;CVE-2025-71133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71136&#34;&gt;CVE-2025-71136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71137&#34;&gt;CVE-2025-71137&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71147&#34;&gt;CVE-2025-71147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71149&#34;&gt;CVE-2025-71149&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71150&#34;&gt;CVE-2025-71150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71154&#34;&gt;CVE-2025-71154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71162&#34;&gt;CVE-2025-71162&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71163&#34;&gt;CVE-2025-71163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71180&#34;&gt;CVE-2025-71180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71182&#34;&gt;CVE-2025-71182&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71183&#34;&gt;CVE-2025-71183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71185&#34;&gt;CVE-2025-71185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71186&#34;&gt;CVE-2025-71186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71189&#34;&gt;CVE-2025-71189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71190&#34;&gt;CVE-2025-71190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71191&#34;&gt;CVE-2025-71191&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71192&#34;&gt;CVE-2025-71192&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71194&#34;&gt;CVE-2025-71194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71196&#34;&gt;CVE-2025-71196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71197&#34;&gt;CVE-2025-71197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-71199&#34;&gt;CVE-2025-71199&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22976&#34;&gt;CVE-2026-22976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22977&#34;&gt;CVE-2026-22977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22978&#34;&gt;CVE-2026-22978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22979&#34;&gt;CVE-2026-22979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22980&#34;&gt;CVE-2026-22980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22982&#34;&gt;CVE-2026-22982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22984&#34;&gt;CVE-2026-22984&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22990&#34;&gt;CVE-2026-22990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22991&#34;&gt;CVE-2026-22991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22992&#34;&gt;CVE-2026-22992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22994&#34;&gt;CVE-2026-22994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22997&#34;&gt;CVE-2026-22997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22998&#34;&gt;CVE-2026-22998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-22999&#34;&gt;CVE-2026-22999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23001&#34;&gt;CVE-2026-23001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23003&#34;&gt;CVE-2026-23003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23005&#34;&gt;CVE-2026-23005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23006&#34;&gt;CVE-2026-23006&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23010&#34;&gt;CVE-2026-23010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23011&#34;&gt;CVE-2026-23011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23019&#34;&gt;CVE-2026-23019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23020&#34;&gt;CVE-2026-23020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23021&#34;&gt;CVE-2026-23021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23025&#34;&gt;CVE-2026-23025&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23026&#34;&gt;CVE-2026-23026&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23030&#34;&gt;CVE-2026-23030&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23031&#34;&gt;CVE-2026-23031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23033&#34;&gt;CVE-2026-23033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23037&#34;&gt;CVE-2026-23037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23038&#34;&gt;CVE-2026-23038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23047&#34;&gt;CVE-2026-23047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23049&#34;&gt;CVE-2026-23049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23054&#34;&gt;CVE-2026-23054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23056&#34;&gt;CVE-2026-23056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23058&#34;&gt;CVE-2026-23058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23060&#34;&gt;CVE-2026-23060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23061&#34;&gt;CVE-2026-23061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23063&#34;&gt;CVE-2026-23063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23064&#34;&gt;CVE-2026-23064&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23068&#34;&gt;CVE-2026-23068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23069&#34;&gt;CVE-2026-23069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23071&#34;&gt;CVE-2026-23071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23073&#34;&gt;CVE-2026-23073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23074&#34;&gt;CVE-2026-23074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23075&#34;&gt;CVE-2026-23075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23076&#34;&gt;CVE-2026-23076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23078&#34;&gt;CVE-2026-23078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23080&#34;&gt;CVE-2026-23080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23083&#34;&gt;CVE-2026-23083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23084&#34;&gt;CVE-2026-23084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23085&#34;&gt;CVE-2026-23085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23086&#34;&gt;CVE-2026-23086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23087&#34;&gt;CVE-2026-23087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23089&#34;&gt;CVE-2026-23089&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23090&#34;&gt;CVE-2026-23090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23091&#34;&gt;CVE-2026-23091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23093&#34;&gt;CVE-2026-23093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23095&#34;&gt;CVE-2026-23095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23096&#34;&gt;CVE-2026-23096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23097&#34;&gt;CVE-2026-23097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23098&#34;&gt;CVE-2026-23098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23099&#34;&gt;CVE-2026-23099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23101&#34;&gt;CVE-2026-23101&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23102&#34;&gt;CVE-2026-23102&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23103&#34;&gt;CVE-2026-23103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23105&#34;&gt;CVE-2026-23105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23107&#34;&gt;CVE-2026-23107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23108&#34;&gt;CVE-2026-23108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23110&#34;&gt;CVE-2026-23110&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1642-1 python3.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1642-1-python3.7/</link>
      <pubDate>Tue, 10 Feb 2026 08:23:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1642-1-python3.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1642-1-python3.7/">
      
&lt;p&gt;Package : python3.7&lt;/p&gt;


&lt;p&gt;Version : 3.7.3-2&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4516&#34;&gt;CVE-2025-4516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6069&#34;&gt;CVE-2025-6069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6075&#34;&gt;CVE-2025-6075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8194&#34;&gt;CVE-2025-8194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8291&#34;&gt;CVE-2025-8291&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-11468&#34;&gt;CVE-2025-11468&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12084&#34;&gt;CVE-2025-12084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-13837&#34;&gt;CVE-2025-13837&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-15282&#34;&gt;CVE-2025-15282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-0672&#34;&gt;CVE-2026-0672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1299&#34;&gt;CVE-2026-1299&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. This may cause memory corruption,
e-mail and HTTP headers injection, validation bypass of .zip archives,
and denial of service (DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-4516&lt;/p&gt;
&lt;p&gt;There is an issue in CPython when using
&lt;code&gt;bytes.decode(&amp;quot;unicode_escape&amp;quot;, error=&amp;quot;ignore|replace&amp;quot;)&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6069&lt;/p&gt;
&lt;p&gt;The html.parser.HTMLParser class had worse-case quadratic
complexity when processing certain crafted malformed inputs
potentially leading to amplified denial-of-service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6075&lt;/p&gt;
&lt;p&gt;If the value passed to os.path.expandvars() is user-controlled a
performance degradation is possible when expanding environment
variables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-8194&lt;/p&gt;
&lt;p&gt;There is a defect in the CPython “tarfile” module affecting the
“TarFile” extraction and entry enumeration APIs. The tar
implementation would process tar archives with negative offsets
without error, resulting in an infinite loop and deadlock during
the parsing of maliciously crafted tar archives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-8291&lt;/p&gt;
&lt;p&gt;The &amp;lsquo;zipfile&amp;rsquo; module would not check the validity of the ZIP64 End
of Central Directory (EOCD) Locator record offset value would not
be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD
record would be assumed to be the previous record in the ZIP
archive. This could be abused to create ZIP archives that are
handled differently by the &amp;lsquo;zipfile&amp;rsquo; module compared to other ZIP
implementations.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-11468&lt;/p&gt;
&lt;p&gt;When folding a long comment in an email header containing
exclusively unfoldable characters, the parenthesis would not be
preserved. This could be used for injecting headers into email
messages where addresses are user-controlled and not sanitized.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-12084&lt;/p&gt;
&lt;p&gt;When building nested elements using xml.dom.minidom methods such
as appendChild() that have a dependency on _clear_id_cache() the
algorithm is quadratic. Availability can be impacted when building
excessively nested documents.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-13837&lt;/p&gt;
&lt;p&gt;When loading a plist file, the plistlib module reads data in size
specified by the file itself, meaning a malicious file can cause
OOM and DoS issues.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-15282&lt;/p&gt;
&lt;p&gt;User-controlled data URLs parsed by urllib.request.DataHandler
allow injecting headers through newlines in the data URL
mediatype.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-0672&lt;/p&gt;
&lt;p&gt;When using http.cookies.Morsel, user-controlled cookie values and
parameters can allow injecting HTTP headers into messages. Patch
rejects all control characters within cookie names, values, and
parameters.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-1299&lt;/p&gt;
&lt;p&gt;The email module, specifically the &amp;ldquo;BytesGenerator&amp;rdquo; class, didn’t
properly quote newlines for email headers when serializing an
email message allowing for header injection when an email is
serialized.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1641-1 python3.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1641-1-python3.5/</link>
      <pubDate>Tue, 10 Feb 2026 08:23:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1641-1-python3.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1641-1-python3.5/">
      
&lt;p&gt;Package : python3.5&lt;/p&gt;


&lt;p&gt;Version : 3.5.3-1&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6069&#34;&gt;CVE-2025-6069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6075&#34;&gt;CVE-2025-6075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8194&#34;&gt;CVE-2025-8194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8291&#34;&gt;CVE-2025-8291&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12084&#34;&gt;CVE-2025-12084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-13837&#34;&gt;CVE-2025-13837&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-15282&#34;&gt;CVE-2025-15282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-0672&#34;&gt;CVE-2026-0672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-1299&#34;&gt;CVE-2026-1299&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. This may cause e-mail and HTTP
headers injection, validation bypass of .zip archives, and denial of
service (DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6069&lt;/p&gt;
&lt;p&gt;The html.parser.HTMLParser class had worse-case quadratic
complexity when processing certain crafted malformed inputs
potentially leading to amplified denial-of-service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6075&lt;/p&gt;
&lt;p&gt;If the value passed to os.path.expandvars() is user-controlled a
performance degradation is possible when expanding environment
variables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-8194&lt;/p&gt;
&lt;p&gt;There is a defect in the CPython “tarfile” module affecting the
“TarFile” extraction and entry enumeration APIs. The tar
implementation would process tar archives with negative offsets
without error, resulting in an infinite loop and deadlock during
the parsing of maliciously crafted tar archives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-8291&lt;/p&gt;
&lt;p&gt;The &amp;lsquo;zipfile&amp;rsquo; module would not check the validity of the ZIP64 End
of Central Directory (EOCD) Locator record offset value would not
be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD
record would be assumed to be the previous record in the ZIP
archive. This could be abused to create ZIP archives that are
handled differently by the &amp;lsquo;zipfile&amp;rsquo; module compared to other ZIP
implementations.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-12084&lt;/p&gt;
&lt;p&gt;When building nested elements using xml.dom.minidom methods such
as appendChild() that have a dependency on _clear_id_cache() the
algorithm is quadratic. Availability can be impacted when building
excessively nested documents.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-13837&lt;/p&gt;
&lt;p&gt;When loading a plist file, the plistlib module reads data in size
specified by the file itself, meaning a malicious file can cause
OOM and DoS issues.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-15282&lt;/p&gt;
&lt;p&gt;User-controlled data URLs parsed by urllib.request.DataHandler
allow injecting headers through newlines in the data URL
mediatype.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-0672&lt;/p&gt;
&lt;p&gt;When using http.cookies.Morsel, user-controlled cookie values and
parameters can allow injecting HTTP headers into messages. Patch
rejects all control characters within cookie names, values, and
parameters.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-1299&lt;/p&gt;
&lt;p&gt;The email module, specifically the &amp;ldquo;BytesGenerator&amp;rdquo; class, didn’t
properly quote newlines for email headers when serializing an
email message allowing for header injection when an email is
serialized.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1640-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1640-1-python2.7/</link>
      <pubDate>Tue, 10 Feb 2026 08:23:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1640-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1640-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.13-2&amp;#43;deb9u12 (stretch), 2.7.16-2&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6069&#34;&gt;CVE-2025-6069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6075&#34;&gt;CVE-2025-6075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8194&#34;&gt;CVE-2025-8194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12084&#34;&gt;CVE-2025-12084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-0672&#34;&gt;CVE-2026-0672&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. This may cause HTTP headers
injection and denial of service (DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6069&lt;/p&gt;
&lt;p&gt;The html.parser.HTMLParser class had worse-case
quadratic complexity when processing certain crafted malformed inputs
potentially leading to amplified denial-of-service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6075&lt;/p&gt;
&lt;p&gt;If the value passed to os.path.expandvars() is user-controlled a
performance degradation is possible when expanding environment
variables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-8194&lt;/p&gt;
&lt;p&gt;There is a defect in the CPython “tarfile” module affecting the
“TarFile” extraction and entry enumeration APIs. The tar
implementation would process tar archives with negative offsets
without error, resulting in an infinite loop and deadlock during
the parsing of maliciously crafted tar archives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-12084&lt;/p&gt;
&lt;p&gt;When building nested elements using xml.dom.minidom methods such
as appendChild() that have a dependency on _clear_id_cache() the
algorithm is quadratic. Availability can be impacted when building
excessively nested documents.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2026-0672&lt;/p&gt;
&lt;p&gt;When using http.cookies.Morsel, user-controlled cookie values and
parameters can allow injecting HTTP headers into messages. Patch
rejects all control characters within cookie names, values, and
parameters.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1639-1 pypy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1639-1-pypy/</link>
      <pubDate>Tue, 10 Feb 2026 08:23:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1639-1-pypy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1639-1-pypy/">
      
&lt;p&gt;Package : pypy&lt;/p&gt;


&lt;p&gt;Version : 7.0.0&amp;#43;dfsg-3&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6069&#34;&gt;CVE-2025-6069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6075&#34;&gt;CVE-2025-6075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8194&#34;&gt;CVE-2025-8194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12084&#34;&gt;CVE-2025-12084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-0672&#34;&gt;CVE-2026-0672&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in PyPy, a fast, compliant
alternative implementation of the Python language.&lt;/p&gt;
&lt;p&gt;All fixed vulnerabilities come from the embedded python2.7 standard
library. Please refer to
&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1640-1-python2.7/&#34;&gt;ELA-1640-1&lt;/a&gt;
for details.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1638-1 phpunit security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1638-1-phpunit/</link>
      <pubDate>Mon, 09 Feb 2026 17:21:24 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1638-1-phpunit/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1638-1-phpunit/">
      
&lt;p&gt;Package : phpunit&lt;/p&gt;


&lt;p&gt;Version : 7.5.6-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-24765&#34;&gt;CVE-2026-24765&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PHPUnit is a testing framework for PHP. A vulnerability has been
discovered involving unsafe deserialization of code coverage data in
PHPT test execution. The vulnerability exists in the
&lt;code&gt;cleanupForCoverage()&lt;/code&gt; method, which deserializes code coverage files
without validation, potentially allowing remote code execution if
malicious &lt;code&gt;.coverage&lt;/code&gt; files are present prior to the execution of the
PHPT test.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1637-1 tomcat9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1637-1-tomcat9/</link>
      <pubDate>Sat, 07 Feb 2026 12:06:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1637-1-tomcat9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1637-1-tomcat9/">
      
&lt;p&gt;Package : tomcat9&lt;/p&gt;


&lt;p&gt;Version : 9.0.107-0&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55752&#34;&gt;CVE-2025-55752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55754&#34;&gt;CVE-2025-55754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-61795&#34;&gt;CVE-2025-61795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in Tomcat 9, a Java web server
and servlet engine. The update corrects various flaws which can lead to a
bypass of security constraints or a denial of service.&lt;/p&gt;
&lt;p&gt;The regression update announced as ELA-1615-2 was incomplete. Some class files
were still missing from jar files which are part of the libtomcat9-java binary
package. In order to remedy this problem the following build-dependencies of
tomcat9 have been upgraded to a new upstream release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;bnd&lt;/li&gt;
&lt;li&gt;osgi-core&lt;/li&gt;
&lt;li&gt;osgi-compendium&lt;/li&gt;
&lt;li&gt;osgi-annotation&lt;/li&gt;
&lt;li&gt;eclipse-jdt-core&lt;/li&gt;
&lt;li&gt;felix-resolver&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1636-1 xrdp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1636-1-xrdp/</link>
      <pubDate>Thu, 05 Feb 2026 20:27:46 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1636-1-xrdp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1636-1-xrdp/">
      
&lt;p&gt;Package : xrdp&lt;/p&gt;


&lt;p&gt;Version : 0.9.9-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68670&#34;&gt;CVE-2025-68670&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;xrdp is an open source RDP server. It was found that xrdp contains an
unauthenticated stack-based buffer overflow vulnerability. The issue
stems from improper bounds checking when processing user domain
information during the connection sequence. If exploited, the
vulnerability could allow remote attackers to execute arbitrary code
on the target system.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1615-2 tomcat9 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1615-2-tomcat9/</link>
      <pubDate>Tue, 03 Feb 2026 11:46:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1615-2-tomcat9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1615-2-tomcat9/">
      
&lt;p&gt;Package : tomcat9&lt;/p&gt;


&lt;p&gt;Version : 9.0.107-0&amp;#43;deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;The tomcat9 security update, released as ELA-1615-1, introduced a regression.
Several classes were missing in tomcat9-jasper-el.jar and tomcat9-embed-el.jar
due to toolchain changes between version 9.0.31 and 9.0.107 which required a
newer version of bnd, a tool to create and diagnose OSGi bundles. Those classes
have been restored.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1635-1 python-tornado security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1635-1-python-tornado/</link>
      <pubDate>Mon, 02 Feb 2026 00:28:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1635-1-python-tornado/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1635-1-python-tornado/">
      
&lt;p&gt;Package : python-tornado&lt;/p&gt;


&lt;p&gt;Version : 5.1.1-4&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67724&#34;&gt;CVE-2025-67724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67725&#34;&gt;CVE-2025-67725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67726&#34;&gt;CVE-2025-67726&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in python-tornado, a scalable,
non-blocking Python web framework and asynchronous networking library.&lt;/p&gt;
&lt;p&gt;CVE-2025-67724&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Custom reason phrases can cause multiple vulnerabilities (like XSS,
header injection, ...) due to being used unescaped in HTTP headers.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-67725&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A single maliciously crafted HTTP request can cause a possible DoS
due to quadratic performance of repeated header lines.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-67726&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An inefficient algorithm when parsing parameters for HTTP header
values can potentially cause a DoS.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1634-1 pyasn1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1634-1-pyasn1/</link>
      <pubDate>Sun, 01 Feb 2026 23:20:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1634-1-pyasn1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1634-1-pyasn1/">
      
&lt;p&gt;Package : pyasn1&lt;/p&gt;


&lt;p&gt;Version : 0.1.9-2&amp;#43;deb9u1 (stretch), 0.4.2-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23490&#34;&gt;CVE-2026-23490&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that pyasn1, a generic ASN.1 library for Python, is
prone to a denial of service vulnerability, which may result in memory
exhaustion from malformed OID/RELATIVE-OID with excessive continuation
octets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1633-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1633-1-modsecurity-apache/</link>
      <pubDate>Sun, 01 Feb 2026 17:08:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1633-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1633-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.9.1-2&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54571&#34;&gt;CVE-2025-54571&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;ModSecurity is an open source, cross platform web application firewall (WAF)
engine for Apache, IIS and Nginx. In versions 2.9.11 and below, an attacker
can override the HTTP response’s Content-Type, which could lead to several
issues depending on the HTTP scenario.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1632-1 ceph security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1632-1-ceph/</link>
      <pubDate>Sun, 01 Feb 2026 03:55:32 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1632-1-ceph/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1632-1-ceph/">
      
&lt;p&gt;Package : ceph&lt;/p&gt;


&lt;p&gt;Version : 10.2.11-2&amp;#43;deb9u4 (stretch), 12.2.11&amp;#43;dfsg1-2.1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47866&#34;&gt;CVE-2024-47866&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Ceph is a distributed object, block, and file storage platform. Using the
argument &lt;code&gt;x-amz-copy-source&lt;/code&gt; to put an object and specifying an empty string
as its content leads to the RGW daemon crashing, resulting in a DoS attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1631-1 libsodium security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1631-1-libsodium/</link>
      <pubDate>Sun, 01 Feb 2026 03:41:31 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1631-1-libsodium/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1631-1-libsodium/">
      
&lt;p&gt;Package : libsodium&lt;/p&gt;


&lt;p&gt;Version : 1.0.17-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-69277&#34;&gt;CVE-2025-69277&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the crypto_core_ed25519_is_valid_point()
function of the Sodium cryptography library mishandled checks for
valid elliptic curve points.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1630-1 dcmtk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1630-1-dcmtk/</link>
      <pubDate>Wed, 28 Jan 2026 13:09:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1630-1-dcmtk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1630-1-dcmtk/">
      
&lt;p&gt;Package : dcmtk&lt;/p&gt;


&lt;p&gt;Version : 3.6.4-2.1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14607&#34;&gt;CVE-2025-14607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14841&#34;&gt;CVE-2025-14841&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been addressed in DCMTK, a collection of
libraries and applications implementing large parts of the DICOM standard
for medical images.&lt;/p&gt;
&lt;p&gt;CVE-2025-14607&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Possible memory corruption caused by illegal attributes in datasets which
are processed by DcmByteString functions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-14841&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Invalid messages sent to dcmqrscp, the Image Central Test Node, may
trigger a segmentation fault due to a NULL pointer being de-referenced.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1629-1 apache-log4j2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1629-1-apache-log4j2/</link>
      <pubDate>Wed, 28 Jan 2026 13:01:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1629-1-apache-log4j2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1629-1-apache-log4j2/">
      
&lt;p&gt;Package : apache-log4j2&lt;/p&gt;


&lt;p&gt;Version : 2.17.1-1~deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68161&#34;&gt;CVE-2025-68161&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In Apache Log4j2, a Java Logging Framework, the Socket Appender does not
perform TLS hostname verification of the peer certificate, even when the
verifyHostName configuration attribute or the log4j2.sslVerifyHostName
system property is set to true. This issue may allow a man-in-the-middle
attacker to intercept or redirect log traffic under specific and hard to
exploit conditions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1628-1 edk2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1628-1-edk2/</link>
      <pubDate>Wed, 28 Jan 2026 12:32:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1628-1-edk2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1628-1-edk2/">
      
&lt;p&gt;Package : edk2&lt;/p&gt;


&lt;p&gt;Version : 2020.11-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28216&#34;&gt;CVE-2021-28216&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38575&#34;&gt;CVE-2021-38575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38576&#34;&gt;CVE-2021-38576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38578&#34;&gt;CVE-2021-38578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36763&#34;&gt;CVE-2022-36763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36764&#34;&gt;CVE-2022-36764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36765&#34;&gt;CVE-2022-36765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45229&#34;&gt;CVE-2023-45229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45230&#34;&gt;CVE-2023-45230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45231&#34;&gt;CVE-2023-45231&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45232&#34;&gt;CVE-2023-45232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45233&#34;&gt;CVE-2023-45233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45234&#34;&gt;CVE-2023-45234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45235&#34;&gt;CVE-2023-45235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1298&#34;&gt;CVE-2024-1298&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38796&#34;&gt;CVE-2024-38796&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been fixed in EDK II, a modern,
feature-rich, cross-platform firmware development environment. Remotely
exploitable buffer overflows and out-of-bounds or infinite loop
vulnerabilities may lead to a denial of service or the execution of
arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1626-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1626-1-apache2/</link>
      <pubDate>Mon, 26 Jan 2026 23:58:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1626-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1626-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.25-3&amp;#43;deb9u22 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-58098&#34;&gt;CVE-2025-58098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-65082&#34;&gt;CVE-2025-65082&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-66200&#34;&gt;CVE-2025-66200&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in apache HTTPD server,
a popular webserver.&lt;/p&gt;
&lt;p&gt;CVE-2025-58098&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache HTTP Server with Server Side Includes (SSI) enabled
and mod_cgid (but not mod_cgi) passes the shell-escaped
query string to #exec cmd=&amp;quot;...&amp;quot; directives
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-65082&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Neutralization of Escape, Meta, or Control Sequences
vulnerability was found in Apache HTTP Server through
environment variables set via the Apache configuration
unexpectedly superseding variables calculated
by the server for CGI programs
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-66200&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A mod_userdir+suexec bypass vulnerability via AllowOverride FileInfo was
found in Apache HTTP Server. Users with access to use the RequestHeader directive
in htaccess can cause some CGI scripts to run under an unexpected userid.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1627-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1627-1-python-django/</link>
      <pubDate>Mon, 26 Jan 2026 11:40:09 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1627-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1627-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u29 (stretch), 1:1.11.29-1&amp;#43;deb10u18 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32052&#34;&gt;CVE-2021-32052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27351&#34;&gt;CVE-2024-27351&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14232&#34;&gt;CVE-2019-14232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39614&#34;&gt;CVE-2024-39614&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45231&#34;&gt;CVE-2024-45231&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Django, the Python-based web
development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-32052: Header injection possibility since &lt;code&gt;URLValidator&lt;/code&gt; accepted
newlines in input on Python 3.9.5+.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27351: Fix a potential regular expression denial-of-service
(&amp;ldquo;ReDoS&amp;rdquo;) attack in &lt;code&gt;django.utils.text.Truncator.words&lt;/code&gt;. This method
(with &lt;code&gt;html=True&lt;/code&gt;) and the &lt;code&gt;truncatewords_html&lt;/code&gt; template filter were subject
to a potential regular expression denial-of-service attack via a suitably
crafted string. This is, in part, a follow up to CVE-2019-14232 and
CVE-2023-43665.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-39614: Fix a potential denial-of-service in
&lt;code&gt;django.utils.translation.get_supported_language_variant&lt;/code&gt;. This method was
subject to a potential DoS attack when used with very long strings
containing specific characters. To mitigate this vulnerability, the
language code provided to &lt;code&gt;get_supported_language_variant&lt;/code&gt; is now parsed up
to a maximum length of 500 characters.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-45231: Potential user email enumeration via response status on
password reset. Due to unhandled email sending failures, the
&lt;code&gt;django.contrib.auth.forms.PasswordResetForm&lt;/code&gt; class allowed remote attackers
to enumerate user emails by issuing password reset requests and observing the
outcomes. To mitigate this risk, exceptions occurring during password reset
email sending are now handled and logged using the &lt;code&gt;django.contrib.auth&lt;/code&gt;
logger.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1625-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1625-1-apache2/</link>
      <pubDate>Mon, 26 Jan 2026 19:17:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1625-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1625-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.59-1~deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55753&#34;&gt;CVE-2025-55753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-58098&#34;&gt;CVE-2025-58098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-65082&#34;&gt;CVE-2025-65082&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-66200&#34;&gt;CVE-2025-66200&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in apache HTTPD server,
a popular webserver.&lt;/p&gt;
&lt;p&gt;CVE-2025-55753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Update mod_md to v2.6.6

An integer overflow was found. In the case of failed ACME certificate
renewal leads, after a number of failures (~30 days in default
configurations), to the backoff timer becoming 0. Attempts to renew
the certificate then are repeated without delays until it succeeds
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-58098&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache HTTP Server with Server Side Includes (SSI) enabled
and mod_cgid (but not mod_cgi) passes the shell-escaped
query string to #exec cmd=&amp;quot;...&amp;quot; directives
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-65082&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Neutralization of Escape, Meta, or Control Sequences
vulnerability was found in Apache HTTP Server through
environment variables set via the Apache configuration
unexpectedly superseding variables calculated
by the server for CGI programs
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-66200&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A mod_userdir+suexec bypass vulnerability via AllowOverride FileInfo was
found in Apache HTTP Server. Users with access to use the RequestHeader directive
in htaccess can cause some CGI scripts to run under an unexpected userid.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1624-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1624-1-imagemagick/</link>
      <pubDate>Mon, 26 Jan 2026 17:13:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1624-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1624-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u25 (stretch), 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u14 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23874&#34;&gt;CVE-2026-23874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23876&#34;&gt;CVE-2026-23876&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-23952&#34;&gt;CVE-2026-23952&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in imagemagick an image manipulation
software suite.&lt;/p&gt;
&lt;p&gt;CVE-2026-23874&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A stack overflow was found via infinite recursion in
MSL (Magick Scripting Language) `&amp;lt;write&amp;gt;` command when
writing to MSL format.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2026-23876&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow vulnerability was found in the XBM
image decoder (ReadXBMImage) allows an attacker to write
controlled data past the allocated heap buffer when
processing a maliciously crafted image file.
Any operation that reads or identifies an image can
trigger the overflow, making it exploitable via common
image upload and processing pipelines.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2026-23952&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference was found in MSL parser via &amp;lt;comment&amp;gt;
tag before image load
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1623-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1623-1-openjdk-11/</link>
      <pubDate>Mon, 26 Jan 2026 16:30:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1623-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1623-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.30&amp;#43;7-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21925&#34;&gt;CVE-2026-21925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21932&#34;&gt;CVE-2026-21932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21933&#34;&gt;CVE-2026-21933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21945&#34;&gt;CVE-2026-21945&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in incorrect certificate validation,
CRLF injection or man-in-the-middle attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1622-1 php7.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1622-1-php7.3/</link>
      <pubDate>Sun, 25 Jan 2026 19:23:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1622-1-php7.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1622-1-php7.3/">
      
&lt;p&gt;Package : php7.3&lt;/p&gt;


&lt;p&gt;Version : 7.3.31-1~deb10u12 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14178&#34;&gt;CVE-2025-14178&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Security issues were found in PHP, a widely-used open source general
purpose scripting language, which could result in server side request
forgery or denial of service.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2025-14178&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Heap buffer overflow in &lt;code&gt;array_merge()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;GHSA-www2-q4fc-65wf&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;&lt;code&gt;dns_get_record()&lt;/code&gt; and other DNS functions don&amp;rsquo;t have any null contain
check, which may lead to SSRF or unexpected behavior.  While this
has a (low) security impact, no CVE ID was assigned for this
vulnerability yet.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1621-1 taglib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1621-1-taglib/</link>
      <pubDate>Sun, 25 Jan 2026 13:28:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1621-1-taglib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1621-1-taglib/">
      
&lt;p&gt;Package : taglib&lt;/p&gt;


&lt;p&gt;Version : 1.11.1&amp;#43;dfsg.1-0.3&amp;#43;deb9u2 (stretch), 1.11.1&amp;#43;dfsg.1-0.3&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47466&#34;&gt;CVE-2023-47466&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issues has been found in taglib, an audio meta-data library.
The issue is related to a segmentation violation and a resulting application crash due to processing a crafted WAV file in which an id3 chunk is the only valid chunk.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1620-1 zvbi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1620-1-zvbi/</link>
      <pubDate>Sun, 25 Jan 2026 13:26:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1620-1-zvbi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1620-1-zvbi/">
      
&lt;p&gt;Package : zvbi&lt;/p&gt;


&lt;p&gt;Version : 0.2.35-13&amp;#43;deb9u1 (stretch), 0.2.35-16&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2173&#34;&gt;CVE-2025-2173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2174&#34;&gt;CVE-2025-2174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2175&#34;&gt;CVE-2025-2175&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2176&#34;&gt;CVE-2025-2176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2177&#34;&gt;CVE-2025-2177&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in zvbi, a Vertical Blanking Interval decoder.
CVE-2025-2173 is related to an uninitialized pointer in src/conv.c:: vbi_strndup_iconv_ucs2()
The other issues are related to integer overflows in several functions distributed all over the code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1619-1 inetutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1619-1-inetutils/</link>
      <pubDate>Sun, 25 Jan 2026 12:27:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1619-1-inetutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1619-1-inetutils/">
      
&lt;p&gt;Package : inetutils&lt;/p&gt;


&lt;p&gt;Version : 1.9.4-2&amp;#43;deb9u4 (stretch), 2:1.9.4-7&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-24061&#34;&gt;CVE-2026-24061&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Kyu Neushwaistein aka Carlos Cortes Alvarez found that inetutils,
a collection of common network programs, was vulnerable to an authentication
bypass problem in telnetd, which could lead to remote root shell access (if
telnetd is enabled and exposed).&lt;/p&gt;
&lt;p&gt;As described also in the GNU InetUtils security advisory, it is not
recommended to run telnetd server at all. At a minimum, restrict network
access to the telnet port to trusted clients only. There is after all no
encryption built into the telnet protocol, so authentication details would
be sent in plain text over the network (which thus needs to be trusted).&lt;/p&gt;
&lt;p&gt;For more details see the GNU InetUtils Security Advisory:
&lt;a href=&#34;https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html&#34;&gt;https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1618-1 python-urllib3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1618-1-python-urllib3/</link>
      <pubDate>Fri, 23 Jan 2026 16:58:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1618-1-python-urllib3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1618-1-python-urllib3/">
      
&lt;p&gt;Package : python-urllib3&lt;/p&gt;


&lt;p&gt;Version : 1.24.1-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2026-21441&#34;&gt;CVE-2026-21441&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that python-urllib3, an HTTP library with thread-safe
connection pooling for Python, was reading the entire response body to
drain the connection and unnecessarily decompressed the content when
following HTTP redirects via the streaming API.&lt;/p&gt;
&lt;p&gt;This decompression occured in way that bypassed the library&amp;rsquo;s
decompression-bomb safeguards.  A malicious server could therefore
exploit this behavior to trigger denial of service on the client due to
excessive resource consumption (high CPU usage and large memory
allocations).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1617-1 gpsd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1617-1-gpsd/</link>
      <pubDate>Mon, 19 Jan 2026 22:36:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1617-1-gpsd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1617-1-gpsd/">
      
&lt;p&gt;Package : gpsd&lt;/p&gt;


&lt;p&gt;Version : 3.17-7&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67268&#34;&gt;CVE-2025-67268&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-67269&#34;&gt;CVE-2025-67269&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in gpsd, a service daemon that
monitors Global Navigation Satellite System (GNSS) receivers attached to a host
computer through serial or USB ports.&lt;/p&gt;
&lt;p&gt;CVE-2025-67268&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;gpsd contains a heap-based out-of-bounds write
vulnerability in the drivers/driver_nmea2000.c file.
The hnd_129540 function, which handles NMEA2000 PGN 129540
(GNSS Satellites in View) packets, fails to validate the
user-supplied satellite count against the size of the skyview
array (184 elements). This allows an attacker to write beyond
the bounds of the array by providing a satellite count up
to 255, leading to memory corruption, Denial of Service (DoS),
and potentially arbitrary code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-67269&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer underflow vulnerability exists in the `nextstate()`
function in `gpsd/packet.c`.
When parsing a NAVCOM packet, the payload length is calculated
using `lexer-&amp;gt;length = (size_t)c - 4` without checking if
the input byte `c` is less than 4. This results in an unsigned
integer underflow, setting `lexer-&amp;gt;length` to a very large value
(near `SIZE_MAX`). The parser then enters a loop attempting to
consume this massive number of bytes, causing 100% CPU utilization
and a Denial of Service (DoS) condition.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1616-1 cjose security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1616-1-cjose/</link>
      <pubDate>Mon, 19 Jan 2026 02:46:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1616-1-cjose/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1616-1-cjose/">
      
&lt;p&gt;Package : cjose&lt;/p&gt;


&lt;p&gt;Version : 0.4.1-3&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37464&#34;&gt;CVE-2023-37464&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the AES GCM decryption routine of cjose, a C
library implementing the JOSE standard, incorrectly uses the tag length
from the actual authentication tag provided in the JWE instead of the
&lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc7518#section-4.7&#34;&gt;specified&lt;/a&gt;
fixed length of 16 bytes.&lt;/p&gt;
&lt;p&gt;This allows an attacker to provide a truncated Authentication Tag and to
modify the JWE accordingly.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1615-1 tomcat9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1615-1-tomcat9/</link>
      <pubDate>Sat, 17 Jan 2026 15:22:40 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1615-1-tomcat9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1615-1-tomcat9/">
      
&lt;p&gt;Package : tomcat9&lt;/p&gt;


&lt;p&gt;Version : 9.0.107-0&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34750&#34;&gt;CVE-2024-34750&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-54677&#34;&gt;CVE-2024-54677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31650&#34;&gt;CVE-2025-31650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31651&#34;&gt;CVE-2025-31651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46701&#34;&gt;CVE-2025-46701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48976&#34;&gt;CVE-2025-48976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48988&#34;&gt;CVE-2025-48988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49125&#34;&gt;CVE-2025-49125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-52434&#34;&gt;CVE-2025-52434&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-52520&#34;&gt;CVE-2025-52520&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53506&#34;&gt;CVE-2025-53506&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55668&#34;&gt;CVE-2025-55668&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in Tomcat 9, a Java
web server and servlet engine. Most notably the update improves the
handling of HTTP/2 connections and corrects various flaws which can lead to
uncontrolled resource consumption and a Denial of Service (DoS)&lt;/p&gt;
&lt;p&gt;A risk analysis was carried out, and it was determined that the best
available solution was to backport the bullseye version of Tomcat to
buster. This decision means that upon installing this update users of
Tomcat in buster will be moving from a Tomcat version of 9.0.31
to 9.0.107.&lt;/p&gt;
&lt;p&gt;Unfortunately, some minor incompatibilities may arise, as documented at the end of this advisory.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2024-34750&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an improper handling of exceptional conditions vulnerability.
Tomcat mishandled excessive HTTP/2 headers, causing stream miscounts and infinite
timeouts that allowed connections to remain open and trigger a denial of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-54677&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an uncontrolled resource consumption vulnerability.
Crafted requests to the bundled examples app could exhaust resources and lead to denial of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-31650&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an improper input validation vulnerability.
Invalid HTTP priority headers were not cleaned up correctly, causing memory leaks that could accumulate and result in an OutOfMemoryException and denial of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-31651&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an improper neutralization vulnerabiltiy.
Certain rewrite rule configurations allowed specially crafted requests to bypass rewrite rules, potentially bypassing associated security constraints.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-46701&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an improper handling of case sensitivity vulnerability.
The CGI servlet failed to correctly enforce case‑sensitive pathInfo checks, enabling attackers to bypass security constraints by altering URL casing.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-48976&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an allocation of resources without limits vulnerabilty.
Multipart headers could be crafted in large numbers to consume excessive memory, enabling Denial of Service (DoS).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-48988&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an allocation of resources without limits vulnerabilty.
Tomcat allowed multipart uploads with many large headers, enabling attackers to exhaust memory and cause Denial of Service (DoS)&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-49125&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an authentication bypass vulnerability.
PreResources or PostResources mounted outside the root could be accessed through unexpected paths not protected by the intended security constraints, enabling bypass of authentication rules.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-52434&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by a race condition.
Improper synchronization during client‑initiated HTTP/2 connection closes could trigger crashes in the APR/Native connector, leading to Denial of Service (DoS).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-52520&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an integer overflow.
Certain multipart upload configurations could trigger an integer overflow, allowing attackers to bypass size limits and cause Denial of Service (DoS)&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-53506&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tomcat was affected by an uncontrolled resource consumption vulnerability.
If an HTTP/2 client failed to acknowledge the initial settings frame, Tomcat could allow excessive concurrent streams, resulting in Denial of Service (DoS)&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;To remediate vulnerabilities in the Tomcat 9 server stack,
an upgrade was performed instead of applying minimal patching.
The following notworthy changes where identified:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Hardened AJP connector: secretRequired
defaults to true. A workarround is to requires explicit config:
secretRequired=&amp;ldquo;false&amp;rdquo; or better from a security point of view
set a secret&lt;/li&gt;
&lt;li&gt;Deprecated RemoteAddrFilter and RemoteHostFilter.
You may migrate to RemoteCIDRFilter and RemoteCIDRValve&lt;/li&gt;
&lt;li&gt;Fix of Session ID propagation for SSO Valve.
This may break SSO.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1613-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1613-1-postgresql-9.6/</link>
      <pubDate>Thu, 15 Jan 2026 20:18:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1613-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1613-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4207&#34;&gt;CVE-2025-4207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8713&#34;&gt;CVE-2025-8713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8714&#34;&gt;CVE-2025-8714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8715&#34;&gt;CVE-2025-8715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12818&#34;&gt;CVE-2025-12818&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in PostgreSQL, a popular database.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2025-4207&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Buffer over-read in PostgreSQL GB18030 encoding
validation allows a database input provider to achieve temporary denial of
service on platforms where a 1-byte over-read can elicit process
termination. This affects the database server and also libpq.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-8713&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;PostgreSQL optimizer statistics allow a user to read
sampled data within a view that the user cannot access. Separately,
statistics allow a user to read sampled data that a row security policy
intended to hide. PostgreSQL maintains statistics for tables by sampling
data available in columns; this data is consulted during the query
planning process. Prior to this release, a user could craft a leaky
operator that bypassed view access control lists (ACLs) and bypassed row
security policies in partitioning or table inheritance hierarchies.
Reachable statistics data notably included histograms and
most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to
close this class of vulnerability, but this gap remained.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-8714&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Untrusted data inclusion in pg_dump in PostgreSQL
allows a malicious superuser of the origin server to inject arbitrary code
for restore-time execution as the client operating system account running
psql to restore the dump, via psql meta-commands. pg_dumpall is also
affected. pg_restore is affected when used to generate a plain-format
dump. This is similar to MySQL CVE-2024-21096.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-8715&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Improper neutralization of newlines in pg_dump in
PostgreSQL allows a user of the origin server to inject arbitrary code for
restore-time execution as the client operating system account running psql
to restore the dump, via psql meta-commands inside a purpose-crafted
object name. The same attacks can achieve SQL injection as a superuser of
the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also
affected. CVE-2012-0868 had fixed this class of problem, but version 11.20
reintroduced it.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-12818&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer wraparound in multiple PostgreSQL libpq client
library functions allows an application input provider or network peer to
cause libpq to undersize an allocation and write out-of-bounds by hundreds
of megabytes. This results in a segmentation fault for the application
using libpq.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1612-1 postgresql-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1612-1-postgresql-11/</link>
      <pubDate>Thu, 15 Jan 2026 20:12:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1612-1-postgresql-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1612-1-postgresql-11/">
      
&lt;p&gt;Package : postgresql-11&lt;/p&gt;


&lt;p&gt;Version : 11.22-0&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4207&#34;&gt;CVE-2025-4207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8713&#34;&gt;CVE-2025-8713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8714&#34;&gt;CVE-2025-8714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8715&#34;&gt;CVE-2025-8715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12817&#34;&gt;CVE-2025-12817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-12818&#34;&gt;CVE-2025-12818&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in PostgreSQL, a popular database.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2025-4207&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Buffer over-read in PostgreSQL GB18030 encoding
validation allows a database input provider to achieve temporary denial of
service on platforms where a 1-byte over-read can elicit process
termination. This affects the database server and also libpq.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-8713&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;PostgreSQL optimizer statistics allow a user to read
sampled data within a view that the user cannot access. Separately,
statistics allow a user to read sampled data that a row security policy
intended to hide. PostgreSQL maintains statistics for tables by sampling
data available in columns; this data is consulted during the query
planning process. Prior to this release, a user could craft a leaky
operator that bypassed view access control lists (ACLs) and bypassed row
security policies in partitioning or table inheritance hierarchies.
Reachable statistics data notably included histograms and
most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to
close this class of vulnerability, but this gap remained.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-8714&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Untrusted data inclusion in pg_dump in PostgreSQL
allows a malicious superuser of the origin server to inject arbitrary code
for restore-time execution as the client operating system account running
psql to restore the dump, via psql meta-commands. pg_dumpall is also
affected. pg_restore is affected when used to generate a plain-format
dump. This is similar to MySQL CVE-2024-21096.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-8715&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Improper neutralization of newlines in pg_dump in
PostgreSQL allows a user of the origin server to inject arbitrary code for
restore-time execution as the client operating system account running psql
to restore the dump, via psql meta-commands inside a purpose-crafted
object name. The same attacks can achieve SQL injection as a superuser of
the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also
affected. CVE-2012-0868 had fixed this class of problem, but version 11.20
reintroduced it.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-12817&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Missing authorization in PostgreSQL CREATE STATISTICS
command allows a table owner to achieve denial of service against other
CREATE STATISTICS users by creating in any schema. A later CREATE
STATISTICS for the same name, from a user having the CREATE privilege,
would then fail.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-12818&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer wraparound in multiple PostgreSQL libpq client
library functions allows an application input provider or network peer to
cause libpq to undersize an allocation and write out-of-bounds by hundreds
of megabytes. This results in a segmentation fault for the application
using libpq.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1614-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1614-1-linux-6.1/</link>
      <pubDate>Thu, 15 Jan 2026 19:25:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1614-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1614-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.159-1~deb9u1 (stretch), 6.1.159-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47666&#34;&gt;CVE-2024-47666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37899&#34;&gt;CVE-2025-37899&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38057&#34;&gt;CVE-2025-38057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38556&#34;&gt;CVE-2025-38556&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38593&#34;&gt;CVE-2025-38593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38678&#34;&gt;CVE-2025-38678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39805&#34;&gt;CVE-2025-39805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40083&#34;&gt;CVE-2025-40083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40211&#34;&gt;CVE-2025-40211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40214&#34;&gt;CVE-2025-40214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40248&#34;&gt;CVE-2025-40248&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40252&#34;&gt;CVE-2025-40252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40253&#34;&gt;CVE-2025-40253&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40254&#34;&gt;CVE-2025-40254&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40257&#34;&gt;CVE-2025-40257&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40258&#34;&gt;CVE-2025-40258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40259&#34;&gt;CVE-2025-40259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40261&#34;&gt;CVE-2025-40261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40262&#34;&gt;CVE-2025-40262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40263&#34;&gt;CVE-2025-40263&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40264&#34;&gt;CVE-2025-40264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40269&#34;&gt;CVE-2025-40269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40271&#34;&gt;CVE-2025-40271&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40272&#34;&gt;CVE-2025-40272&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40273&#34;&gt;CVE-2025-40273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40275&#34;&gt;CVE-2025-40275&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40277&#34;&gt;CVE-2025-40277&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40278&#34;&gt;CVE-2025-40278&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40279&#34;&gt;CVE-2025-40279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40280&#34;&gt;CVE-2025-40280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40281&#34;&gt;CVE-2025-40281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40282&#34;&gt;CVE-2025-40282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40283&#34;&gt;CVE-2025-40283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40284&#34;&gt;CVE-2025-40284&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40285&#34;&gt;CVE-2025-40285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40286&#34;&gt;CVE-2025-40286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40288&#34;&gt;CVE-2025-40288&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40292&#34;&gt;CVE-2025-40292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40293&#34;&gt;CVE-2025-40293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40294&#34;&gt;CVE-2025-40294&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40297&#34;&gt;CVE-2025-40297&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40301&#34;&gt;CVE-2025-40301&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40304&#34;&gt;CVE-2025-40304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40306&#34;&gt;CVE-2025-40306&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40308&#34;&gt;CVE-2025-40308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40309&#34;&gt;CVE-2025-40309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40312&#34;&gt;CVE-2025-40312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40313&#34;&gt;CVE-2025-40313&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40314&#34;&gt;CVE-2025-40314&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40315&#34;&gt;CVE-2025-40315&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40317&#34;&gt;CVE-2025-40317&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40318&#34;&gt;CVE-2025-40318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40319&#34;&gt;CVE-2025-40319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40321&#34;&gt;CVE-2025-40321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40322&#34;&gt;CVE-2025-40322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40323&#34;&gt;CVE-2025-40323&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40324&#34;&gt;CVE-2025-40324&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40331&#34;&gt;CVE-2025-40331&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40341&#34;&gt;CVE-2025-40341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40342&#34;&gt;CVE-2025-40342&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40343&#34;&gt;CVE-2025-40343&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40345&#34;&gt;CVE-2025-40345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40360&#34;&gt;CVE-2025-40360&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40363&#34;&gt;CVE-2025-40363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68168&#34;&gt;CVE-2025-68168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68171&#34;&gt;CVE-2025-68171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68173&#34;&gt;CVE-2025-68173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68176&#34;&gt;CVE-2025-68176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68177&#34;&gt;CVE-2025-68177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68185&#34;&gt;CVE-2025-68185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68191&#34;&gt;CVE-2025-68191&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68192&#34;&gt;CVE-2025-68192&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68194&#34;&gt;CVE-2025-68194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68200&#34;&gt;CVE-2025-68200&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68204&#34;&gt;CVE-2025-68204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68214&#34;&gt;CVE-2025-68214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68217&#34;&gt;CVE-2025-68217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68218&#34;&gt;CVE-2025-68218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68220&#34;&gt;CVE-2025-68220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68227&#34;&gt;CVE-2025-68227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68229&#34;&gt;CVE-2025-68229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68231&#34;&gt;CVE-2025-68231&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68233&#34;&gt;CVE-2025-68233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68237&#34;&gt;CVE-2025-68237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68238&#34;&gt;CVE-2025-68238&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68241&#34;&gt;CVE-2025-68241&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68244&#34;&gt;CVE-2025-68244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68245&#34;&gt;CVE-2025-68245&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68246&#34;&gt;CVE-2025-68246&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68282&#34;&gt;CVE-2025-68282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68283&#34;&gt;CVE-2025-68283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68284&#34;&gt;CVE-2025-68284&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68285&#34;&gt;CVE-2025-68285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68286&#34;&gt;CVE-2025-68286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68287&#34;&gt;CVE-2025-68287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68288&#34;&gt;CVE-2025-68288&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68289&#34;&gt;CVE-2025-68289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68290&#34;&gt;CVE-2025-68290&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68295&#34;&gt;CVE-2025-68295&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68301&#34;&gt;CVE-2025-68301&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68302&#34;&gt;CVE-2025-68302&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68303&#34;&gt;CVE-2025-68303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68307&#34;&gt;CVE-2025-68307&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68308&#34;&gt;CVE-2025-68308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68310&#34;&gt;CVE-2025-68310&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68312&#34;&gt;CVE-2025-68312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68321&#34;&gt;CVE-2025-68321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68327&#34;&gt;CVE-2025-68327&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68328&#34;&gt;CVE-2025-68328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68330&#34;&gt;CVE-2025-68330&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68331&#34;&gt;CVE-2025-68331&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68339&#34;&gt;CVE-2025-68339&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68343&#34;&gt;CVE-2025-68343&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68734&#34;&gt;CVE-2025-68734&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1611-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1611-1-samba/</link>
      <pubDate>Thu, 15 Jan 2026 16:42:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1611-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1611-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:4.5.16&amp;#43;dfsg-1&amp;#43;deb9u6 (stretch), 2:4.9.5&amp;#43;dfsg-5&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9640&#34;&gt;CVE-2025-9640&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in Samba, a SMB/CIFS file, print, and login
server for Unix, in the streams_xattr VFS server module, where
uninitialized heap memory could be written into alternate data
streams. An authenticated attacker can read residual memory content
that may include sensitive data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1610-1 gnupg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1610-1-gnupg2/</link>
      <pubDate>Wed, 14 Jan 2026 15:17:22 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1610-1-gnupg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1610-1-gnupg2/">
      
&lt;p&gt;Package : gnupg2&lt;/p&gt;


&lt;p&gt;Version : 2.1.18-8~deb9u6 (stretch), 2.2.12-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68973&#34;&gt;CVE-2025-68973&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been discovered in gnupg2, a tool for secure
communication and data storage.&lt;/p&gt;
&lt;p&gt;CVE-2025-68973&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There exist memory corruptions in the armor parsing code of GnuPG
that can be exploited to provide primitives like out of bounds
buffer read and write. This might be exploitable to the point of
remote code execution (RCE).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Additional issues:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;+ Potential key signature digest algorithm downgrade.

  GnuPG may downgrade the message digest algorithm to insecure SHA1
  algorithm during signature checking due to reading from
  uninitialized memory. This reduces the security of User ID
  Certification Signatures to that of SHA1. SHA1 suffers from known
  cryptographic weaknesses like chosen prefix attacks.

+ Multiple plaintext attack on detached PGP signatures.

  An attacker can arbitrarily swap the plaintext shown to a GnuPG
  user, when the user verifies a detached signature versus views it
  with `--decrypt`. This attack allows deceiving users verifying
  messages, following GnuPG usage best practices about the content
  of a message signed with a detached signature. Note, that it is
  possible in many scenarios to convert between signature types,
  i.e., convert a different signature type to a detached signature.

+ GnuPG Accepts Path Separators and Path Traversals in Literal Data.

  GnuPG accepts arbitrary file paths in the unsigned Literal Data
  packet filename field and uses that value without sufficient
  sanitization. In combination with tricking a user with ANSI
  formatted output that changes GnuPG output with deceptive apparent
  GnuPG logs, this can lead to creation or overwrite of any file on
  the system the user can write to, including executable files which
  the user may later execute.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1609-1 libidn2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1609-1-libidn2/</link>
      <pubDate>Mon, 12 Jan 2026 14:22:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1609-1-libidn2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1609-1-libidn2/">
      
&lt;p&gt;Package : libidn2&lt;/p&gt;


&lt;p&gt;Version : 2.0.5-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12290&#34;&gt;CVE-2019-12290&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that libidn2, a library for internationalized domain names (IDNA2008/TR46),
was vulnerable to a domain impersonation attack, where especially crafted domain names
could impersonate other domains.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1608-1 u-boot security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1608-1-u-boot/</link>
      <pubDate>Mon, 05 Jan 2026 21:24:56 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1608-1-u-boot/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1608-1-u-boot/">
      
&lt;p&gt;Package : u-boot&lt;/p&gt;


&lt;p&gt;Version : 2016.11&amp;#43;dfsg1-4&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24857&#34;&gt;CVE-2025-24857&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that improper access control for volatile memory containing
boot code in Universal Boot Loader (U-Boot) before 2017.11 and Qualcomm
chips IPQ4019, IPQ5018, IPQ5322, IPQ6018, IPQ8064, IPQ8074, and IPQ9574
could allow an attacker to execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1607-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1607-1-gimp/</link>
      <pubDate>Mon, 05 Jan 2026 12:00:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1607-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1607-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2007-3126&#34;&gt;CVE-2007-3126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14422&#34;&gt;CVE-2025-14422&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple file parsing problems where identified in GIMP, the
GNU Image Manipulation Program, that could lead to crashes or even
arbitrary code execution when opening malicious files.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2007-3126&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Gimp before 2.8.22 allows context-dependent attackers to cause a denial of
service (crash) via an ICO file with an InfoHeader containing a Height of
zero, a similar issue to CVE-2007-2237.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-14422&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on
affected installations of GIMP. User interaction is required to exploit this
vulnerability in that the target must visit a malicious page or open a
malicious file. The specific flaw exists within the parsing of PNM files. The
issue results from the lack of proper validation of user-supplied data, which
can result in an integer overflow before allocating a buffer. An attacker can
leverage this vulnerability to execute code in the context of the current
process. Was ZDI-CAN-28273.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;NOTE: See &lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1604-1-gimp/&#34;&gt;ELA-1604-1 for Debian 10 (buster)&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1606-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1606-1-imagemagick/</link>
      <pubDate>Mon, 05 Jan 2026 10:04:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1606-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1606-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u24 (stretch), 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-65955&#34;&gt;CVE-2025-65955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-66628&#34;&gt;CVE-2025-66628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68618&#34;&gt;CVE-2025-68618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68950&#34;&gt;CVE-2025-68950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-69204&#34;&gt;CVE-2025-69204&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in imagemagick an image manipulation
software suite.&lt;/p&gt;
&lt;p&gt;CVE-2025-65955&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in ImageMagick’s Magick++ layer that
manifests when Options::fontFamily is invoked with an empty
string. Clearing a font family calls RelinquishMagickMemory on
_drawInfo-&amp;gt;font, freeing the font string but leaving _drawInfo-&amp;gt;font
pointing to freed memory while _drawInfo-&amp;gt;family is set to that
(now-invalid) pointer. Any later cleanup or reuse of _drawInfo-&amp;gt;font
re-frees or dereferences dangling memory. DestroyDrawInfo and other
setters (Options::font, Image::font) assume _drawInfo-&amp;gt;font remains
valid, so destruction or subsequent updates trigger crashes or heap
corruption
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-66628&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The TIM (PSX TIM) image parser contains a critical integer overflow
vulnerability in its ReadTIMImage function (coders/tim.c). The code
reads width and height (16-bit values) from the file header and
calculates image_size = 2 * width * height without checking for
overflow. On 32-bit systems (or where size_t is 32-bit), this
calculation can overflow if width and height are large (e.g., 65535),
wrapping around to a small value
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-68618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Magick&#39;s failure to limit the depth of SVG file reads caused
a DoS attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-68950&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Magick&#39;s failure to limit MVG mutual references forming a loop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-69204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Converting a malicious MVG file to SVG caused an integer overflow.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1605-1 adminer security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1605-1-adminer/</link>
      <pubDate>Sun, 04 Jan 2026 20:31:57 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1605-1-adminer/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1605-1-adminer/">
      
&lt;p&gt;Package : adminer&lt;/p&gt;


&lt;p&gt;Version : 4.7.1-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45195&#34;&gt;CVE-2023-45195&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45196&#34;&gt;CVE-2023-45196&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in adminer, a web-based database
administration tool.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2023-45195&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Adminer is vulnerable to SSRF via database connection fields. This
could allow an unauthenticated remote attacker to enumerate or
access systems the attacker would not otherwise have access to.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2023-45196&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Adminer allows an unauthenticated remote attacker to cause a denial
of service by connecting to an attacker-controlled service that
responds with HTTP redirects. The denial of service is subject to
PHP configuration limits.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1604-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1604-1-gimp/</link>
      <pubDate>Sat, 03 Jan 2026 13:53:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1604-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1604-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.10.8-2&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14422&#34;&gt;CVE-2025-14422&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14425&#34;&gt;CVE-2025-14425&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple file parsing problems where identified in GIMP, the
GNU Image Manipulation Program, that could lead to crashes or even
arbitrary code execution when opening malicious files.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2025-14422&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on
affected installations of GIMP. User interaction is required to exploit this
vulnerability in that the target must visit a malicious page or open a
malicious file. The specific flaw exists within the parsing of PNM files. The
issue results from the lack of proper validation of user-supplied data, which
can result in an integer overflow before allocating a buffer. An attacker can
leverage this vulnerability to execute code in the context of the current
process. Was ZDI-CAN-28273.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-14425&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution
Vulnerability. This vulnerability allows remote attackers to execute
arbitrary code on affected installations of GIMP. User interaction is
required to exploit this vulnerability in that the target must visit a
malicious page or open a malicious file. The specific flaw exists within
the parsing of JP2 files. The issue results from the lack of proper
validation of the length of user-supplied data prior to copying it to a
heap-based buffer. An attacker can leverage this vulnerability to execute
code in the context of the current process. Was ZDI-CAN-28248.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;NOTE: See &lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1607-1-gimp/&#34;&gt;ELA-1607-1 for Debian 9 (stretch)&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1603-1 net-snmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1603-1-net-snmp/</link>
      <pubDate>Thu, 01 Jan 2026 13:53:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1603-1-net-snmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1603-1-net-snmp/">
      
&lt;p&gt;Package : net-snmp&lt;/p&gt;


&lt;p&gt;Version : 5.7.3&amp;#43;dfsg-1.7&amp;#43;deb9u6 (stretch), 5.7.3&amp;#43;dfsg-5&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68615&#34;&gt;CVE-2025-68615&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;net-snmp is a SNMP application library, tools and daemon.&lt;/p&gt;
&lt;p&gt;A specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer
overflow and the daemon to crash.&lt;/p&gt;
&lt;p&gt;(SNMP ports should never be open to public networks. There is no mitigation
available other than ensuring ports to snmptrapd are appropriately firewalled
or by upgrading.)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1602-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1602-1-python-django/</link>
      <pubDate>Mon, 29 Dec 2025 12:41:48 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1602-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1602-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u28 (stretch), 1:1.11.29-1&amp;#43;deb10u17 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-64460&#34;&gt;CVE-2025-64460&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential denial-of-service vulnerability was discovered in Django, a popular
Python-based web development framework.&lt;/p&gt;
&lt;p&gt;An algorithmic complexity issue in the getInnerText() method in the
django.core.serializers.xml_serializer class could have allowed a remote
attacker to cause a potential denial-of-service, triggering CPU and memory
exhaustion via a specially crafted XML input submitted to a service that
invokes the XML Deserializer. The vulnerability resulted from repeated string
concatenation while recursively collecting text nodes which produced
superlinear-style computation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1601-1 python-urllib3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1601-1-python-urllib3/</link>
      <pubDate>Fri, 26 Dec 2025 13:46:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1601-1-python-urllib3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1601-1-python-urllib3/">
      
&lt;p&gt;Package : python-urllib3&lt;/p&gt;


&lt;p&gt;Version : 1.19.1-1&amp;#43;deb9u4 (stretch), 1.24.1-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-50181&#34;&gt;CVE-2025-50181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-66418&#34;&gt;CVE-2025-66418&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-50181&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Redirects were not disabled when &lt;code&gt;retries&lt;/code&gt; are disabled on &lt;code&gt;PoolManager&lt;/code&gt;
instantiation.  An application attempting to mitigate server-side
request forgery (SSRF) or open redirect vulnerabilities by disabling
redirects at the &lt;code&gt;PoolManager&lt;/code&gt; level remained vulnerable.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-66418&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;The number of links in the decompression chain was unbounded,
allowing a malicious server to insert a virtually unlimited number
of compression steps which could lead to denial of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1600-1 gst-plugins-base1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1600-1-gst-plugins-base1.0/</link>
      <pubDate>Fri, 26 Dec 2025 12:14:39 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1600-1-gst-plugins-base1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1600-1-gst-plugins-base1.0/">
      
&lt;p&gt;Package : gst-plugins-base1.0&lt;/p&gt;


&lt;p&gt;Version : 1.10.4-1&amp;#43;deb9u6 (stretch), 1.14.4-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47806&#34;&gt;CVE-2025-47806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47807&#34;&gt;CVE-2025-47807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47808&#34;&gt;CVE-2025-47808&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in the plugins for the GStreamer
media framework leading to a crash.&lt;/p&gt;
&lt;p&gt;CVE-2025-47806&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In GStreamer, the subparse plugin&#39;s parse_subrip_time function
may write data past the bounds of a stack buffer, leading to
a crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-47807&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In GStreamer, the subparse plugin&#39;s subrip_unescape_formatting
function may dereference a NULL pointer while parsing a subtitle
file, leading to a crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-47808&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In GStreamer, the subparse plugin&#39;s tmplayer_parse_line function may
dereference a NULL pointer while parsing a subtitle file, leading to
a crash.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1599-1 usbmuxd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1599-1-usbmuxd/</link>
      <pubDate>Mon, 22 Dec 2025 03:21:41 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1599-1-usbmuxd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1599-1-usbmuxd/">
      
&lt;p&gt;Package : usbmuxd&lt;/p&gt;


&lt;p&gt;Version : 1.1.0-2&amp;#43;deb9u1 (stretch), 1.1.1~git20181007.f838cf6-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-66004&#34;&gt;CVE-2025-66004&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that usbmuxd, USB multiplexor daemon for iPhone and
iPod Touch devices, incorrectly handled certain paths received with
the SavePairRecord command. A local attacker could possibly use this
issue to delete and write files named *.plist in arbitrary locations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1598-1 roundcube security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1598-1-roundcube/</link>
      <pubDate>Fri, 19 Dec 2025 21:38:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1598-1-roundcube/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1598-1-roundcube/">
      
&lt;p&gt;Package : roundcube&lt;/p&gt;


&lt;p&gt;Version : 1.3.17&amp;#43;dfsg.1-1~deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68460&#34;&gt;CVE-2025-68460&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-68461&#34;&gt;CVE-2025-68461&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-68460&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Information disclosure vulnerability in the HTML style sanitizer.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-68461&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Cross-Site-Scripting (XSS) vulnerability via SVG&amp;rsquo;s &lt;code&gt;&amp;lt;animate&amp;gt;&lt;/code&gt; tag,
which could allow a remote attacker to load arbitrary JavaScript
code and might lead to privilege escalation or information
disclosure via malicious SVG document.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1597-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1597-1-glib2.0/</link>
      <pubDate>Thu, 18 Dec 2025 14:34:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1597-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1597-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.50.3-2&amp;#43;deb9u8 (stretch), 2.58.3-2&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4373&#34;&gt;CVE-2025-4373&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-7039&#34;&gt;CVE-2025-7039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-13601&#34;&gt;CVE-2025-13601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14087&#34;&gt;CVE-2025-14087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-14512&#34;&gt;CVE-2025-14512&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in GLib, a general-purpose, portable utility
library, that could lead to denial of service, memory corruption or
potentially arbitrary code execution if maliciously crafted data is
processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1596-1 python-apt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1596-1-python-apt/</link>
      <pubDate>Tue, 16 Dec 2025 01:26:01 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1596-1-python-apt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1596-1-python-apt/">
      
&lt;p&gt;Package : python-apt&lt;/p&gt;


&lt;p&gt;Version : 1.4.4 (stretch), 1.8.4.4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6966&#34;&gt;CVE-2025-6966&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Julian Andres Klode discovered that python-apt, a Python interface to
libapt-pkg, incorrectly handled deb822 configuration files. An attacker
could use this issue to cause python-apt to crash, resulting in a
denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1595-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1595-1-linux-5.10/</link>
      <pubDate>Sat, 13 Dec 2025 08:58:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1595-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1595-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.247-1~deb9u1 (stretch), 5.10.247-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-53498&#34;&gt;CVE-2023-53498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47666&#34;&gt;CVE-2024-47666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50143&#34;&gt;CVE-2024-50143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57947&#34;&gt;CVE-2024-57947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21861&#34;&gt;CVE-2025-21861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21887&#34;&gt;CVE-2025-21887&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22058&#34;&gt;CVE-2025-22058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23143&#34;&gt;CVE-2025-23143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38678&#34;&gt;CVE-2025-38678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39866&#34;&gt;CVE-2025-39866&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39869&#34;&gt;CVE-2025-39869&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39876&#34;&gt;CVE-2025-39876&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39883&#34;&gt;CVE-2025-39883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39885&#34;&gt;CVE-2025-39885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39907&#34;&gt;CVE-2025-39907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39911&#34;&gt;CVE-2025-39911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39913&#34;&gt;CVE-2025-39913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39923&#34;&gt;CVE-2025-39923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39937&#34;&gt;CVE-2025-39937&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39945&#34;&gt;CVE-2025-39945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39949&#34;&gt;CVE-2025-39949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39951&#34;&gt;CVE-2025-39951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39953&#34;&gt;CVE-2025-39953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39955&#34;&gt;CVE-2025-39955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39964&#34;&gt;CVE-2025-39964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39967&#34;&gt;CVE-2025-39967&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39968&#34;&gt;CVE-2025-39968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39969&#34;&gt;CVE-2025-39969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39970&#34;&gt;CVE-2025-39970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39971&#34;&gt;CVE-2025-39971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39972&#34;&gt;CVE-2025-39972&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39973&#34;&gt;CVE-2025-39973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39980&#34;&gt;CVE-2025-39980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39985&#34;&gt;CVE-2025-39985&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39986&#34;&gt;CVE-2025-39986&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39987&#34;&gt;CVE-2025-39987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39993&#34;&gt;CVE-2025-39993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39994&#34;&gt;CVE-2025-39994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39995&#34;&gt;CVE-2025-39995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39996&#34;&gt;CVE-2025-39996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39998&#34;&gt;CVE-2025-39998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40001&#34;&gt;CVE-2025-40001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40006&#34;&gt;CVE-2025-40006&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40011&#34;&gt;CVE-2025-40011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40018&#34;&gt;CVE-2025-40018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40019&#34;&gt;CVE-2025-40019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40020&#34;&gt;CVE-2025-40020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40021&#34;&gt;CVE-2025-40021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40022&#34;&gt;CVE-2025-40022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40026&#34;&gt;CVE-2025-40026&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40027&#34;&gt;CVE-2025-40027&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40029&#34;&gt;CVE-2025-40029&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40030&#34;&gt;CVE-2025-40030&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40035&#34;&gt;CVE-2025-40035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40042&#34;&gt;CVE-2025-40042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40044&#34;&gt;CVE-2025-40044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40048&#34;&gt;CVE-2025-40048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40049&#34;&gt;CVE-2025-40049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40053&#34;&gt;CVE-2025-40053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40055&#34;&gt;CVE-2025-40055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40070&#34;&gt;CVE-2025-40070&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40078&#34;&gt;CVE-2025-40078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40081&#34;&gt;CVE-2025-40081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40083&#34;&gt;CVE-2025-40083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40087&#34;&gt;CVE-2025-40087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40088&#34;&gt;CVE-2025-40088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40105&#34;&gt;CVE-2025-40105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40106&#34;&gt;CVE-2025-40106&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40109&#34;&gt;CVE-2025-40109&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40111&#34;&gt;CVE-2025-40111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40115&#34;&gt;CVE-2025-40115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40116&#34;&gt;CVE-2025-40116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40118&#34;&gt;CVE-2025-40118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40121&#34;&gt;CVE-2025-40121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40125&#34;&gt;CVE-2025-40125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40127&#34;&gt;CVE-2025-40127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40134&#34;&gt;CVE-2025-40134&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40140&#34;&gt;CVE-2025-40140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40153&#34;&gt;CVE-2025-40153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40154&#34;&gt;CVE-2025-40154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40167&#34;&gt;CVE-2025-40167&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40173&#34;&gt;CVE-2025-40173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40178&#34;&gt;CVE-2025-40178&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40183&#34;&gt;CVE-2025-40183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40186&#34;&gt;CVE-2025-40186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40187&#34;&gt;CVE-2025-40187&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40188&#34;&gt;CVE-2025-40188&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40190&#34;&gt;CVE-2025-40190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40194&#34;&gt;CVE-2025-40194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40197&#34;&gt;CVE-2025-40197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40198&#34;&gt;CVE-2025-40198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40200&#34;&gt;CVE-2025-40200&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40204&#34;&gt;CVE-2025-40204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40205&#34;&gt;CVE-2025-40205&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40211&#34;&gt;CVE-2025-40211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40219&#34;&gt;CVE-2025-40219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40220&#34;&gt;CVE-2025-40220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40223&#34;&gt;CVE-2025-40223&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40231&#34;&gt;CVE-2025-40231&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40233&#34;&gt;CVE-2025-40233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40240&#34;&gt;CVE-2025-40240&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40243&#34;&gt;CVE-2025-40243&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40244&#34;&gt;CVE-2025-40244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40248&#34;&gt;CVE-2025-40248&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40254&#34;&gt;CVE-2025-40254&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40257&#34;&gt;CVE-2025-40257&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40258&#34;&gt;CVE-2025-40258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40259&#34;&gt;CVE-2025-40259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40261&#34;&gt;CVE-2025-40261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40262&#34;&gt;CVE-2025-40262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40263&#34;&gt;CVE-2025-40263&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40264&#34;&gt;CVE-2025-40264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40269&#34;&gt;CVE-2025-40269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40271&#34;&gt;CVE-2025-40271&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40273&#34;&gt;CVE-2025-40273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40275&#34;&gt;CVE-2025-40275&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40277&#34;&gt;CVE-2025-40277&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40278&#34;&gt;CVE-2025-40278&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40280&#34;&gt;CVE-2025-40280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40281&#34;&gt;CVE-2025-40281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40282&#34;&gt;CVE-2025-40282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40283&#34;&gt;CVE-2025-40283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40304&#34;&gt;CVE-2025-40304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40306&#34;&gt;CVE-2025-40306&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40308&#34;&gt;CVE-2025-40308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40309&#34;&gt;CVE-2025-40309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40312&#34;&gt;CVE-2025-40312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40315&#34;&gt;CVE-2025-40315&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40317&#34;&gt;CVE-2025-40317&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40319&#34;&gt;CVE-2025-40319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40321&#34;&gt;CVE-2025-40321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40322&#34;&gt;CVE-2025-40322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40324&#34;&gt;CVE-2025-40324&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40331&#34;&gt;CVE-2025-40331&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40342&#34;&gt;CVE-2025-40342&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;This version additionally includes many more bug fixes
from stable updates 5.10.245-5.10.247.  The broken &lt;code&gt;pktcdvd&lt;/code&gt; driver has
also been disabled.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1594-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1594-1-tzdata/</link>
      <pubDate>Fri, 12 Dec 2025 10:46:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1594-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1594-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2025b-0&amp;#43;deb9u2 (stretch), 2025b-0&amp;#43;deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;This update includes the latest changes to the leap second list,
including an update to its expiry date, which was set for the end of
December.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1593-1 libsoup2.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1593-1-libsoup2.4/</link>
      <pubDate>Thu, 11 Dec 2025 14:54:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1593-1-libsoup2.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1593-1-libsoup2.4/">
      
&lt;p&gt;Package : libsoup2.4&lt;/p&gt;


&lt;p&gt;Version : 2.56.0-2&amp;#43;deb9u5 (stretch), 2.64.2-2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4476&#34;&gt;CVE-2025-4476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4945&#34;&gt;CVE-2025-4945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4948&#34;&gt;CVE-2025-4948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4969&#34;&gt;CVE-2025-4969&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in libsoup2.4.&lt;/p&gt;
&lt;p&gt;libsoup is an HTTP client/server library for GNOME. It uses GObjects and the
glib main loop, to integrate well with GNOME applications.&lt;/p&gt;
&lt;p&gt;CVE-2025-4945: integer overflow in cookie parsing.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the cookie parsing logic of the libsoup HTTP
library, used in GNOME applications and other software. The
vulnerability arises when processing the expiration date of cookies,
where a specially crafted value can trigger an integer overflow. This
may result in undefined behavior, allowing an attacker to bypass cookie
expiration logic, causing persistent or unintended cookie behavior. The
issue stems from improper validation of large integer inputs during date
arithmetic operations within the cookie parsing routines.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4476: crash in soup_auth_digest_get_protection_space.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A denial-of-service vulnerability has been identified in the libsoup
HTTP client library. This flaw can be triggered when a libsoup client
receives a 401 (Unauthorized) HTTP response containing a specifically
crafted domain parameter within the WWW-Authenticate header. Processing
this malformed header can lead to a crash of the client application
using libsoup. An attacker could exploit this by setting up a malicious
HTTP server. If a user&#39;s application using the vulnerable libsoup
library connects to this malicious server, it could result in a
denial-of-service. Successful exploitation requires tricking a user&#39;s
client application into connecting to the attacker&#39;s malicious server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4948: verify boundary limits for multipart body.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the soup_multipart_new_from_message() function of
the libsoup HTTP library, which is commonly used by GNOME and other
applications to handle web communications. The issue occurs when the
library processes specially crafted multipart messages. Due to improper
validation, an internal calculation can go wrong, leading to an integer
underflow. This can cause the program to access invalid memory and
crash. As a result, any application or server using libsoup could be
forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4969: verify array bounds before accessing.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in the libsoup package. This flaw stems from
its failure to correctly verify the termination of multipart HTTP
messages. This can allow a remote attacker to send a specially crafted
multipart HTTP body, causing the libsoup-consuming server to read beyond
its allocated memory boundaries (out-of-bounds read).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1592-1 libssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1592-1-libssh/</link>
      <pubDate>Wed, 10 Dec 2025 15:45:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1592-1-libssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1592-1-libssh/">
      
&lt;p&gt;Package : libssh&lt;/p&gt;


&lt;p&gt;Version : 0.7.3-2&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6004&#34;&gt;CVE-2023-6004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4877&#34;&gt;CVE-2025-4877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4878&#34;&gt;CVE-2025-4878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5318&#34;&gt;CVE-2025-5318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8114&#34;&gt;CVE-2025-8114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8277&#34;&gt;CVE-2025-8277&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in libssh, a tiny C SSH library.&lt;/p&gt;
&lt;p&gt;CVE-2023-6004&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vinci found a command injection issue in the ProxyCommand and ProxyJump
features.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4877&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ronald Crane found that bin_to_base64() could experience an integer
overflow and subsequent under allocation, leading to an out of
bounds write on 32-bit builds.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4878&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ronald Crane found that privatekey_from_file() used an uninitialized
variable under certain conditions, which could lead to signing
failure, use-after-free or memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-5318&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ronald Crane found that sftp_handle() had an incorrect check, which
could lead to an out of bounds read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-8114&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Philippe Antoine found a null pointer dereference issue when libssh
calculates the session id for the key exchange (KEX) process and an
error happens when allocating memory using cryptographic functions,
leading to a crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-8277&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Francesco Rollo a memory leak during the KEX process when a client
sets the `first_kex_packet_follows` flag in the KEXINIT message and
repeatedly makes incorrect KEX guesses.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1591-1 libssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1591-1-libssh/</link>
      <pubDate>Wed, 10 Dec 2025 15:42:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1591-1-libssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1591-1-libssh/">
      
&lt;p&gt;Package : libssh&lt;/p&gt;


&lt;p&gt;Version : 0.8.7-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4877&#34;&gt;CVE-2025-4877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4878&#34;&gt;CVE-2025-4878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5318&#34;&gt;CVE-2025-5318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8114&#34;&gt;CVE-2025-8114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8277&#34;&gt;CVE-2025-8277&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in libssh, a tiny C SSH library.&lt;/p&gt;
&lt;p&gt;CVE-2025-4877&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ronald Crane found that bin_to_base64() could experience an integer
overflow and subsequent under allocation, leading to an out of
bounds write on 32-bit builds.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4878&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ronald Crane found that privatekey_from_file() used an uninitialized
variable under certain conditions, which could lead to signing
failure, use-after-free or memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-5318&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ronald Crane found that sftp_handle() had an incorrect check, which
could lead to an out of bounds read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-8114&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Philippe Antoine found a null pointer dereference issue when libssh
calculates the session id for the key exchange (KEX) process and an
error happens when allocating memory using cryptographic functions,
leading to a crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-8277&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Francesco Rollo a memory leak during the KEX process when a client
sets the `first_kex_packet_follows` flag in the KEXINIT message and
repeatedly makes incorrect KEX guesses.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1590-1 lasso security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1590-1-lasso/</link>
      <pubDate>Mon, 08 Dec 2025 11:46:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1590-1-lasso/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1590-1-lasso/">
      
&lt;p&gt;Package : lasso&lt;/p&gt;


&lt;p&gt;Version : 2.5.0-5&amp;#43;deb9u2 (stretch), 2.6.0-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46404&#34;&gt;CVE-2025-46404&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46705&#34;&gt;CVE-2025-46705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46784&#34;&gt;CVE-2025-46784&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47151&#34;&gt;CVE-2025-47151&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Keane O&amp;rsquo;Kelley discovered several vulnerabilities in lasso, a library
implementing Liberty Alliance and SAML protocols, which could result in
denial of service or the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1589-1 libpng1.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1589-1-libpng1.6/</link>
      <pubDate>Sun, 07 Dec 2025 09:04:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1589-1-libpng1.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1589-1-libpng1.6/">
      
&lt;p&gt;Package : libpng1.6&lt;/p&gt;


&lt;p&gt;Version : 1.6.28-1&amp;#43;deb9u2 (stretch), 1.6.36-6&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-64505&#34;&gt;CVE-2025-64505&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-64506&#34;&gt;CVE-2025-64506&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-64720&#34;&gt;CVE-2025-64720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-65018&#34;&gt;CVE-2025-65018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-66293&#34;&gt;CVE-2025-66293&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties have been found in libpng, the official PNG reference
library, allowing information disclosure via out-of-bounds read, denial of
service via application crash, or heap corruption with potential for arbitrary
code execution.&lt;/p&gt;
&lt;p&gt;CVE-2025-64505&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer over-read in png_do_quantize via malformed palette index.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-64506&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer over-read in png_write_image_8bit
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-64720&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in png_image_read_composite via incorrect palette
premultiplication
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-65018&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer overflow in png_combine_row triggered via png_image_finish_read
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-66293&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds read vulnerability in libpng&#39;s simplified API allows
reading up to 1012 bytes beyond the png_sRGB_base[512] array when
processing palette PNG images with partial transparency and gamma correction
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1588-1 libhtp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1588-1-libhtp/</link>
      <pubDate>Thu, 04 Dec 2025 13:28:35 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1588-1-libhtp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1588-1-libhtp/">
      
&lt;p&gt;Package : libhtp&lt;/p&gt;


&lt;p&gt;Version : 1:0.5.30-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23837&#34;&gt;CVE-2024-23837&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45797&#34;&gt;CVE-2024-45797&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple cases of denial of service due to excessive CPU time and memory
utilization have been fixed in LibHTP, a parser for the HTTP protocol
mainly used by the network analysis and threat detection software Suricata.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1587-1 libapache2-mod-auth-openidc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1587-1-libapache2-mod-auth-openidc/</link>
      <pubDate>Wed, 03 Dec 2025 12:51:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1587-1-libapache2-mod-auth-openidc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1587-1-libapache2-mod-auth-openidc/">
      
&lt;p&gt;Package : libapache2-mod-auth-openidc&lt;/p&gt;


&lt;p&gt;Version : 2.3.10.2-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3891&#34;&gt;CVE-2025-3891&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been fixed in mod_auth_openidc, an OpenID
Certified authentication and authorization module for the Apache 2.x
HTTP server that implements the OpenID Connect Relying Party
functionality.&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker can crash the Apache httpd process by
sending a POST request without a Content-Type header when
OIDCPreservePost is enabled in mod_auth_openidc. This leads to denial
of service.&lt;/p&gt;
&lt;p&gt;A workaround is to disable the OIDCPreservePost directive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1568-2 unbound1.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1568-2-unbound1.9/</link>
      <pubDate>Mon, 01 Dec 2025 00:24:29 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1568-2-unbound1.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1568-2-unbound1.9/">
      
&lt;p&gt;Package : unbound1.9&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u2~deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-11411&#34;&gt;CVE-2025-11411&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan discovered that the
initial fix for CVE-2025-11411 as applied in &lt;a href=&#34;https://www.freexian.com/ela-1568-1-unbound1.9/&#34;&gt;ELA 1568-1&lt;/a&gt;
did not fully fix the vulnerability.  Updated packages correcting this
issue are now available.&lt;/p&gt;
&lt;p&gt;Additionally, this update includes a fix for potential amplification
DDoS attacks due to improperly following cleared &lt;code&gt;RD&lt;/code&gt; flags.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1567-2 unbound security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1567-2-unbound/</link>
      <pubDate>Mon, 01 Dec 2025 00:23:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1567-2-unbound/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1567-2-unbound/">
      
&lt;p&gt;Package : unbound&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-11411&#34;&gt;CVE-2025-11411&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan discovered that the
initial fix for CVE-2025-11411 as applied in &lt;a href=&#34;https://www.freexian.com/ela-1567-1-unbound/&#34;&gt;ELA 1567-1&lt;/a&gt;
did not fully fix the vulnerability.  Updated packages correcting this
issue are now available.&lt;/p&gt;
&lt;p&gt;Additionally, this update includes a fix for potential amplification
DDoS attacks due to improperly following cleared &lt;code&gt;RD&lt;/code&gt; flags.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1586-1 cups-filters security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1586-1-cups-filters/</link>
      <pubDate>Sun, 30 Nov 2025 18:41:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1586-1-cups-filters/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1586-1-cups-filters/">
      
&lt;p&gt;Package : cups-filters&lt;/p&gt;


&lt;p&gt;Version : 1.11.6-3&amp;#43;deb9u4 (stretch), 1.21.6-5&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-57812&#34;&gt;CVE-2025-57812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-64503&#34;&gt;CVE-2025-64503&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-64524&#34;&gt;CVE-2025-64524&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in cups-filters, which provides additional CUPS filters.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-64503
out of bounds write vulnerability when processing crafted
PDF files containing a large &amp;lsquo;Mediabox&amp;rsquo; value&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-57812
out of bounds read/write vulnerability in the processing
of TIFF image files&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-64524
infinite loop with crafted input raster file, that resuls
into a heap buffer overflow&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1585-1 qtbase-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1585-1-qtbase-opensource-src/</link>
      <pubDate>Sat, 29 Nov 2025 10:41:24 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1585-1-qtbase-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1585-1-qtbase-opensource-src/">
      
&lt;p&gt;Package : qtbase-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.7.1&amp;#43;dfsg-3&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9541&#34;&gt;CVE-2015-9541&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An exponential XML entity expansion was discovered in Qt, a
cross-platform C++ application framework. A crafted SVG document was
mishandled in QXmlStreamReader and would cause a denial of service, a
related issue to CVE 2003-1564 (&amp;ldquo;billion laughs attack&amp;rdquo;).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1584-1 qtbase-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1584-1-qtbase-opensource-src/</link>
      <pubDate>Sat, 29 Nov 2025 10:41:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1584-1-qtbase-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1584-1-qtbase-opensource-src/">
      
&lt;p&gt;Package : qtbase-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.11.3&amp;#43;dfsg1-1&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39936&#34;&gt;CVE-2024-39936&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A race condition was discovered in Qt, a cross-platform C++
application framework. Code to make security-relevant decisions about
an established HTTP2 connection may execute too early, because the
encrypted() signal has not yet been emitted and processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1583-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1583-1-linux-6.1/</link>
      <pubDate>Tue, 25 Nov 2025 16:00:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1583-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1583-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.158-1~deb9u1 (stretch), 6.1.158-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40207&#34;&gt;CVE-2025-40207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40205&#34;&gt;CVE-2025-40205&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40204&#34;&gt;CVE-2025-40204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40202&#34;&gt;CVE-2025-40202&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40201&#34;&gt;CVE-2025-40201&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40200&#34;&gt;CVE-2025-40200&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40198&#34;&gt;CVE-2025-40198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40197&#34;&gt;CVE-2025-40197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40194&#34;&gt;CVE-2025-40194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40193&#34;&gt;CVE-2025-40193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40190&#34;&gt;CVE-2025-40190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40188&#34;&gt;CVE-2025-40188&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40187&#34;&gt;CVE-2025-40187&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40186&#34;&gt;CVE-2025-40186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40183&#34;&gt;CVE-2025-40183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40179&#34;&gt;CVE-2025-40179&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40178&#34;&gt;CVE-2025-40178&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40176&#34;&gt;CVE-2025-40176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40173&#34;&gt;CVE-2025-40173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40171&#34;&gt;CVE-2025-40171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40167&#34;&gt;CVE-2025-40167&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40156&#34;&gt;CVE-2025-40156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40154&#34;&gt;CVE-2025-40154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40153&#34;&gt;CVE-2025-40153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40141&#34;&gt;CVE-2025-40141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40140&#34;&gt;CVE-2025-40140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40134&#34;&gt;CVE-2025-40134&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40127&#34;&gt;CVE-2025-40127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40126&#34;&gt;CVE-2025-40126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40125&#34;&gt;CVE-2025-40125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40124&#34;&gt;CVE-2025-40124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40123&#34;&gt;CVE-2025-40123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40121&#34;&gt;CVE-2025-40121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40120&#34;&gt;CVE-2025-40120&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40118&#34;&gt;CVE-2025-40118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40116&#34;&gt;CVE-2025-40116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40115&#34;&gt;CVE-2025-40115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40112&#34;&gt;CVE-2025-40112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40111&#34;&gt;CVE-2025-40111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40109&#34;&gt;CVE-2025-40109&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40107&#34;&gt;CVE-2025-40107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40106&#34;&gt;CVE-2025-40106&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40105&#34;&gt;CVE-2025-40105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40104&#34;&gt;CVE-2025-40104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40103&#34;&gt;CVE-2025-40103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40100&#34;&gt;CVE-2025-40100&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40099&#34;&gt;CVE-2025-40099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40096&#34;&gt;CVE-2025-40096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40095&#34;&gt;CVE-2025-40095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40094&#34;&gt;CVE-2025-40094&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40093&#34;&gt;CVE-2025-40093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40092&#34;&gt;CVE-2025-40092&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40088&#34;&gt;CVE-2025-40088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40087&#34;&gt;CVE-2025-40087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40085&#34;&gt;CVE-2025-40085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40084&#34;&gt;CVE-2025-40084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40081&#34;&gt;CVE-2025-40081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40080&#34;&gt;CVE-2025-40080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40078&#34;&gt;CVE-2025-40078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40070&#34;&gt;CVE-2025-40070&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40068&#34;&gt;CVE-2025-40068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40062&#34;&gt;CVE-2025-40062&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40060&#34;&gt;CVE-2025-40060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40056&#34;&gt;CVE-2025-40056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40055&#34;&gt;CVE-2025-40055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40053&#34;&gt;CVE-2025-40053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40051&#34;&gt;CVE-2025-40051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40049&#34;&gt;CVE-2025-40049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40048&#34;&gt;CVE-2025-40048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40044&#34;&gt;CVE-2025-40044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40043&#34;&gt;CVE-2025-40043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40042&#34;&gt;CVE-2025-40042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40040&#34;&gt;CVE-2025-40040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40036&#34;&gt;CVE-2025-40036&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40035&#34;&gt;CVE-2025-40035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40032&#34;&gt;CVE-2025-40032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40030&#34;&gt;CVE-2025-40030&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40029&#34;&gt;CVE-2025-40029&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40027&#34;&gt;CVE-2025-40027&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40026&#34;&gt;CVE-2025-40026&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40022&#34;&gt;CVE-2025-40022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40021&#34;&gt;CVE-2025-40021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40020&#34;&gt;CVE-2025-40020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40019&#34;&gt;CVE-2025-40019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40018&#34;&gt;CVE-2025-40018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40013&#34;&gt;CVE-2025-40013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40011&#34;&gt;CVE-2025-40011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40010&#34;&gt;CVE-2025-40010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40008&#34;&gt;CVE-2025-40008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40006&#34;&gt;CVE-2025-40006&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40001&#34;&gt;CVE-2025-40001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39998&#34;&gt;CVE-2025-39998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39996&#34;&gt;CVE-2025-39996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39995&#34;&gt;CVE-2025-39995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39994&#34;&gt;CVE-2025-39994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39993&#34;&gt;CVE-2025-39993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39988&#34;&gt;CVE-2025-39988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39987&#34;&gt;CVE-2025-39987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39986&#34;&gt;CVE-2025-39986&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39985&#34;&gt;CVE-2025-39985&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39982&#34;&gt;CVE-2025-39982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39980&#34;&gt;CVE-2025-39980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39978&#34;&gt;CVE-2025-39978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39977&#34;&gt;CVE-2025-39977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39973&#34;&gt;CVE-2025-39973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39972&#34;&gt;CVE-2025-39972&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39971&#34;&gt;CVE-2025-39971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39970&#34;&gt;CVE-2025-39970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39969&#34;&gt;CVE-2025-39969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39968&#34;&gt;CVE-2025-39968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39967&#34;&gt;CVE-2025-39967&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39964&#34;&gt;CVE-2025-39964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39957&#34;&gt;CVE-2025-39957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39955&#34;&gt;CVE-2025-39955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39953&#34;&gt;CVE-2025-39953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39951&#34;&gt;CVE-2025-39951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39949&#34;&gt;CVE-2025-39949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39946&#34;&gt;CVE-2025-39946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39945&#34;&gt;CVE-2025-39945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39944&#34;&gt;CVE-2025-39944&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39943&#34;&gt;CVE-2025-39943&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39942&#34;&gt;CVE-2025-39942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39938&#34;&gt;CVE-2025-39938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39937&#34;&gt;CVE-2025-39937&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39934&#34;&gt;CVE-2025-39934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39931&#34;&gt;CVE-2025-39931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39929&#34;&gt;CVE-2025-39929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21861&#34;&gt;CVE-2025-21861&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1582-1 erlang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1582-1-erlang/</link>
      <pubDate>Mon, 24 Nov 2025 17:48:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1582-1-erlang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1582-1-erlang/">
      
&lt;p&gt;Package : erlang&lt;/p&gt;


&lt;p&gt;Version : 1:19.2.1&amp;#43;dfsg-2&amp;#43;really23.3.4.18-0&amp;#43;deb9u5 (stretch), 1:22.2.7&amp;#43;dfsg-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4748&#34;&gt;CVE-2025-4748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48038&#34;&gt;CVE-2025-48038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48039&#34;&gt;CVE-2025-48039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48041&#34;&gt;CVE-2025-48041&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in Erlang a concurrent, real-time,
distributed functional language.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2025-4748&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Improper Limitation of a Pathname to a Restricted Directory (&amp;lsquo;Path
Traversal&amp;rsquo;) vulnerability in Erlang OTP (stdlib modules) allows
Absolute Path Traversal, File Manipulation. This vulnerability is
associated with program files lib/stdlib/src/zip.erl and program
routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2
unless the memory option is passed.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-48038, CVE-2025-48039, CVE-2025-48041&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Allocation of Resources Without Limits or Throttling vulnerability
in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation,
Resource Leak Exposure, Flooding. These vulnerabilities are
associated with program files lib/ssh/src/ssh_sftpd.erl.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1581-1 libsoup2.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1581-1-libsoup2.4/</link>
      <pubDate>Wed, 19 Nov 2025 09:39:12 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1581-1-libsoup2.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1581-1-libsoup2.4/">
      
&lt;p&gt;Package : libsoup2.4&lt;/p&gt;


&lt;p&gt;Version : 2.56.0-2&amp;#43;deb9u4 (stretch), 2.64.2-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2784&#34;&gt;CVE-2025-2784&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32050&#34;&gt;CVE-2025-32050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32052&#34;&gt;CVE-2025-32052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32053&#34;&gt;CVE-2025-32053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32906&#34;&gt;CVE-2025-32906&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32909&#34;&gt;CVE-2025-32909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32910&#34;&gt;CVE-2025-32910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32911&#34;&gt;CVE-2025-32911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32912&#34;&gt;CVE-2025-32912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32913&#34;&gt;CVE-2025-32913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32914&#34;&gt;CVE-2025-32914&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues has been identified in libsoup2.4. This update contains
fixes for a few of them that have previously been addressed in LTS and newer
releases. Additional updates will come when more of the recently allocated
CVE ids have been analyzed.&lt;/p&gt;
&lt;p&gt;CVE-2025-2784:
heap buffer over-read when sniffing content via the skip_insight_whitespace()
function. Libsoup clients may read one byte out-of-bounds in response to a
crafted HTTP response by an HTTP server.&lt;/p&gt;
&lt;p&gt;CVE-2025-32050:
libsoup append_param_quoted() function may contain an overflow bug resulting
in a buffer under-read.&lt;/p&gt;
&lt;p&gt;CVE-2025-32052: vulnerability in the sniff_unknown() function may lead to
heap buffer over-read.&lt;/p&gt;
&lt;p&gt;CVE-2025-32053:
vulnerability in sniff_feed_or_html() and skip_insignificant_space()
functions may lead to a heap buffer over-read.&lt;/p&gt;
&lt;p&gt;CVE-2025-32906:
soup_headers_parse_request() function may be vulnerable to an out-of-bound
read. This flaw allows a malicious user to use a specially crafted HTTP
request to crash the HTTP server.&lt;/p&gt;
&lt;p&gt;CVE-2025-32909:
SoupContentSniffer may be vulnerable to a NULL pointer dereference in the
sniff_mp4 function. The HTTP server may cause the libsoup client to crash.&lt;/p&gt;
&lt;p&gt;CVE-2025-32910:
soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference.
This issue may cause the libsoup client to crash.&lt;/p&gt;
&lt;p&gt;CVE-2025-32911:
use-after-free memory issue not on the heap in the
soup_message_headers_get_content_disposition() function. This flaw allows a
malicious HTTP client to cause memory corruption in the libsoup server.&lt;/p&gt;
&lt;p&gt;CVE-2025-32913:
the soup_message_headers_get_content_disposition() function is vulnerable to
a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a
libsoup client or server that uses this function.&lt;/p&gt;
&lt;p&gt;CVE-2025-32914:
the soup_multipart_new_from_message() function is vulnerable to an
out-of-bounds read. This flaw allows a malicious HTTP client to induce the
libsoup server to read out of bounds.&lt;/p&gt;
&lt;p&gt;CVE-2025-32912:
SoupAuthDigest is vulnerable to a NULL pointer dereference. The HTTP server
may cause the libsoup client to crash.&lt;/p&gt;
&lt;p&gt;Additionally for buster an updated test certificate was included that extends
the expiration to year 2049.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1580-1 libssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1580-1-libssh/</link>
      <pubDate>Tue, 18 Nov 2025 15:51:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1580-1-libssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1580-1-libssh/">
      
&lt;p&gt;Package : libssh&lt;/p&gt;


&lt;p&gt;Version : 0.8.7-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16135&#34;&gt;CVE-2020-16135&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6004&#34;&gt;CVE-2023-6004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6918&#34;&gt;CVE-2023-6918&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in libssh, a tiny C SSH library.&lt;/p&gt;
&lt;p&gt;CVE-2020-16135&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference was found in sftpserver, which would lead
to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6004&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was reported that using the ProxyCommand or the ProxyJump feature
may allow an attacker to inject malicious code through specially
crafted hostnames.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6918&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jack Weinstein reported that missing checks for return values for
digests may result in denial of service (application crashes) or
usage of uninitialized memory.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1579-1 mbedtls security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1579-1-mbedtls/</link>
      <pubDate>Mon, 17 Nov 2025 15:08:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1579-1-mbedtls/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1579-1-mbedtls/">
      
&lt;p&gt;Package : mbedtls&lt;/p&gt;


&lt;p&gt;Version : 2.16.9-0~deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47917&#34;&gt;CVE-2025-47917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48965&#34;&gt;CVE-2025-48965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-52496&#34;&gt;CVE-2025-52496&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-52497&#34;&gt;CVE-2025-52497&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in mbedtls, a lightweight crypto and
SSL/TLS library.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-47917&lt;/p&gt;
&lt;p&gt;MbedTLS allows use-after-free in certain situations in the correctly
developed applications.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-48965&lt;/p&gt;
&lt;p&gt;The handling of &lt;code&gt;val.p&lt;/code&gt; and &lt;code&gt;val.len&lt;/code&gt; in &lt;code&gt;mbedtls_asn1_store_named_data&lt;/code&gt; was
inconsistent and allowed &lt;code&gt;NULL&lt;/code&gt; pointer dereference. The fix for this issue
depended on fixes for two related issues in the same piece of code, which
are now also fixed.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-52496&lt;/p&gt;
&lt;p&gt;A race condition in AESNI detection could occur if certain compiler
optimisations were applied, making it possible to extract an AES key from
a multithreaded program or perform a GCM forgery.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-52497&lt;/p&gt;
&lt;p&gt;In &lt;code&gt;mbedtls_pem_read_buffer&lt;/code&gt; and two &lt;code&gt;mbedtls_pk_parse&lt;/code&gt; functions, one-byte
heap-based buffer underflow could occur.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1578-1 squid security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1578-1-squid/</link>
      <pubDate>Fri, 14 Nov 2025 17:49:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1578-1-squid/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1578-1-squid/">
      
&lt;p&gt;Package : squid&lt;/p&gt;


&lt;p&gt;Version : 4.13-10&amp;#43;deb11u6~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5824&#34;&gt;CVE-2023-5824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46728&#34;&gt;CVE-2023-46728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54574&#34;&gt;CVE-2025-54574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-59362&#34;&gt;CVE-2025-59362&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-62168&#34;&gt;CVE-2025-62168&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were reported in Squid, a popular proxy server.&lt;/p&gt;
&lt;p&gt;The changes required to fix all the open vulnerabilities, especially
CVE-2025-62168, were too invasive to be backported individually, and the risk
of regressions was too high due to large amount of source code that needed to
be modified or rewritten, including the internal C++ library.&lt;/p&gt;
&lt;p&gt;After carrying out a risk analysis, it was determined that the best available
solution was to backport the version from Debian 11 &amp;ldquo;bullseye&amp;rdquo; to Debian 10.
This decision means that, upon installing this update, users of Squid in Debian
10 will be moving from Squid version 4.6 to 4.13.&lt;/p&gt;
&lt;p&gt;Please note that to remediate CVE-2025-62168, users need to review their Squid
configuration and disable the insecure &lt;code&gt;email_err_data&lt;/code&gt; setting if it was
previously enabled. The CVE-2025-62168 patch disables this configuration by
default, but it does not override existing insecure administrator-defined
settings.&lt;/p&gt;
&lt;p&gt;CVE-2023-5824:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-46728:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid&#39;s Gopher gateway. The gopher protocol support was enabled by default in previous Squid versions. Responses triggering this bug can be received from any gopher server, even those without malicious intent.
Gopher support has been removed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-54574:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-59362:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Squid mishandles ASN.1 encoding of long SNMP OIDs. This occurs in `asn_build_objid` in `lib/snmplib/asn1.c`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-62168:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a malicious actor to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1577-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1577-1-gst-plugins-good1.0/</link>
      <pubDate>Thu, 13 Nov 2025 16:46:12 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1577-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1577-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.10.4-1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47543&#34;&gt;CVE-2024-47543&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47545&#34;&gt;CVE-2024-47545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47546&#34;&gt;CVE-2024-47546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47597&#34;&gt;CVE-2024-47597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47219&#34;&gt;CVE-2025-47219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer media framework.&lt;/p&gt;
&lt;p&gt;CVE-2024-47543:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An OOB-read vulnerability has been discovered
in qtdemux_parse_container function within qtdemux.c.
In the parent function qtdemux_parse_node, the value of
length is not well checked. So, if length is big enough,
it causes the pointer end to point beyond the boundaries
of buffer. Subsequently, in the qtdemux_parse_container
function, the while loop can trigger an OOB-read,
accessing memory beyond the bounds of buf.
This vulnerability can result in reading up to
4GB of process memory or potentially causing a
segmentation fault (SEGV) when accessing invalid memory
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47545:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer underflow has been detected in qtdemux_parse_trak function
within qtdemux.c. During the strf parsing case, the subtraction
size -= 40 can lead to a negative integer overflow if it is less than
40. If this happens, the subsequent call to gst_buffer_fill will
invoke memcpy with a large tocopy size, resulting in an OOB-read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47546:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer underflow has been detected
in extract_cc_from_data function within qtdemux.c.
In the FOURCC_c708 case, the subtraction atom_length - 8
may result in an underflow if atom_length is less than 8.
When that subtraction underflows, *cclen ends up being a
large number, and then cclen is passed to g_memdup2
leading to an out-of-bounds (OOB) read
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47597:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An OOB-read has been detected in the function
qtdemux_parse_samples within qtdemux.c. This issue arises
when the function qtdemux_parse_samples reads data beyond
the boundaries of the stream-&amp;gt;stco buffer. The following code
snippet shows the call to qt_atom_parser_get_offset_unchecked,
which leads to the OOB-read when parsing the provided
GHSL-2024-245_crash1.mp4 file. This issue may lead
to read up to 8 bytes out-of-bounds.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-47219:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The isomp4 plugin&#39;s qtdemux_parse_trak() function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1576-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1576-1-gst-plugins-good1.0/</link>
      <pubDate>Wed, 12 Nov 2025 21:42:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1576-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1576-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.14.4-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47183&#34;&gt;CVE-2025-47183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47219&#34;&gt;CVE-2025-47219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer media framework.&lt;/p&gt;
&lt;p&gt;CVE-2025-47183&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The isomp4 plugin&#39;s qtdemux_parse_tree() function may read past the end of a heap buffer while parsing an MP4 file, leading to information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-47219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The isomp4 plugin&#39;s qtdemux_parse_trak() function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1575-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1575-1-libarchive/</link>
      <pubDate>Tue, 11 Nov 2025 11:13:35 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1575-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1575-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.2.2-2&amp;#43;deb9u6 (stretch), 3.3.3-4&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5914&#34;&gt;CVE-2025-5914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5916&#34;&gt;CVE-2025-5916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5917&#34;&gt;CVE-2025-5917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5918&#34;&gt;CVE-2025-5918&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties were fixed in libarchive a multi-format archive and compression library.&lt;/p&gt;
&lt;p&gt;CVE-2025-5914&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-5916&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-5917&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This flaw involves an &#39;off-by-one&#39; miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-5918&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1574-1 dcmtk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1574-1-dcmtk/</link>
      <pubDate>Tue, 11 Nov 2025 08:35:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1574-1-dcmtk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1574-1-dcmtk/">
      
&lt;p&gt;Package : dcmtk&lt;/p&gt;


&lt;p&gt;Version : 3.6.4-2.1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36855&#34;&gt;CVE-2020-36855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4981&#34;&gt;CVE-2022-4981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9732&#34;&gt;CVE-2025-9732&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been fixed in DCMTK, a collection of
libraries and applications implementing large parts of the DICOM standard
for medical images.&lt;/p&gt;
&lt;p&gt;CVE-2025-9732&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Processing of an invalid DICOM image with a Photometric
Interpretation of &amp;quot;YBR_FULL&amp;quot; and a Planar Configuration of &amp;quot;1&amp;quot; where
the number of pixels stored does not match the expected number of pixels.
This may lead to memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4981&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Various issues in the dcmqrscp configuration file parser that could cause
application crashes when reading a malformed configuration file, due to
insufficient checks of the input data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36855&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Stack-based overflow in the dcmqrscp config parser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1573-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1573-1-gimp/</link>
      <pubDate>Tue, 11 Nov 2025 08:29:55 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1573-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1573-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u6 (stretch), 2.10.8-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-10934&#34;&gt;CVE-2025-10934&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;GIMP, the GNU Image Manipulation Program, is vulnerable to a heap-based buffer
overflow when parsing XWD files. This vulnerability allows remote attackers to
execute arbitrary code on affected installations of GIMP and requires the
target to visit a malicious page or open a malicious file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1572-1 geographiclib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1572-1-geographiclib/</link>
      <pubDate>Tue, 11 Nov 2025 08:25:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1572-1-geographiclib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1572-1-geographiclib/">
      
&lt;p&gt;Package : geographiclib&lt;/p&gt;


&lt;p&gt;Version : 1.46-2&amp;#43;deb9u1 (stretch), 1.49-4&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-60751&#34;&gt;CVE-2025-60751&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Geographiclib is a C++ library to solve geodesic problems. A stack buffer
overflow occurs when the GeoConvert tool receives a crafted input. The
overflow occurs because the program does not properly validate an internal
index, allowing an out-of-bounds write on the stack. An attacker can exploit
this vulnerability to hijack the program&amp;rsquo;s control flow by overwriting a return
address to point to a libc function and execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1571-1 strongswan security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1571-1-strongswan/</link>
      <pubDate>Tue, 11 Nov 2025 02:31:10 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1571-1-strongswan/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1571-1-strongswan/">
      
&lt;p&gt;Package : strongswan&lt;/p&gt;


&lt;p&gt;Version : 5.7.2-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-62291&#34;&gt;CVE-2025-62291&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Xu Biang discovered a buffer overflow bug in the eap-mschapv2 plugin of
strongSwan, an IKE/IPsec suite. The eap-mschapv2 plugin does not correctly
check the length of an EAP-MSCHAPv2 Failure Request packet on the client, which
can cause an integer underflow that leads to a crash, and a heap-based buffer
overflow that&amp;rsquo;s potentially exploitable for remote code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1570-1 gdk-pixbuf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1570-1-gdk-pixbuf/</link>
      <pubDate>Sun, 09 Nov 2025 23:36:46 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1570-1-gdk-pixbuf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1570-1-gdk-pixbuf/">
      
&lt;p&gt;Package : gdk-pixbuf&lt;/p&gt;


&lt;p&gt;Version : 2.36.5-2&amp;#43;deb9u4 (stretch), 2.38.1&amp;#43;dfsg-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-7345&#34;&gt;CVE-2025-7345&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in gdk-pixbuf, a library used by many GTK
applications to load graphical assets. When processing maliciously
crafted JPEG images, a heap buffer overflow can occur during Base64
encoding.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1569-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1569-1-openjdk-8/</link>
      <pubDate>Fri, 07 Nov 2025 11:01:11 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1569-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1569-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u472-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53057&#34;&gt;CVE-2025-53057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53066&#34;&gt;CVE-2025-53066&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in XML external entity injection attacks or incorrect
certificate validation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1568-1 unbound1.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1568-1-unbound1.9/</link>
      <pubDate>Thu, 06 Nov 2025 20:13:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1568-1-unbound1.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1568-1-unbound1.9/">
      
&lt;p&gt;Package : unbound1.9&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u2~deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-11411&#34;&gt;CVE-2025-11411&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan discovered that
unbound, a validating, recursive, and caching DNS resolver, was
vulnerable to cache poisoning via NS RRSet injection, which could lead
to domain hijack.&lt;/p&gt;
&lt;p&gt;Promiscuous NS RRSets that complement DNS replies in the authority
section can be used to trick resolvers to update their delegation
information for the zone.  Usually these RRSets are used to update the
resolver&amp;rsquo;s knowledge of the zone&amp;rsquo;s name servers.  A malicious actor who
is able to attach such records in a reply (i.e., spoofed packet,
fragmentation attack) can poison Unbound&amp;rsquo;s cache for the delegation
point.&lt;/p&gt;
&lt;p&gt;The fix scrubs unsolicited NS RRSets (and their respective address
records) from replies, thereby mitigating the possible poison effect.
The protection can be turned off by setting the new configuration option
&amp;ldquo;iter-scrub-promiscuous&amp;rdquo; to &amp;ldquo;no&amp;rdquo;, see
&lt;a href=&#34;https://manpages.debian.org/unbound.conf.5.html&#34;&gt;unbound.conf(5)&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1567-1 unbound security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1567-1-unbound/</link>
      <pubDate>Thu, 06 Nov 2025 20:13:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1567-1-unbound/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1567-1-unbound/">
      
&lt;p&gt;Package : unbound&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-11411&#34;&gt;CVE-2025-11411&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan discovered that
unbound, a validating, recursive, and caching DNS resolver, was
vulnerable to cache poisoning via NS RRSet injection, which could lead
to domain hijack.&lt;/p&gt;
&lt;p&gt;Promiscuous NS RRSets that complement DNS replies in the authority
section can be used to trick resolvers to update their delegation
information for the zone.  Usually these RRSets are used to update the
resolver&amp;rsquo;s knowledge of the zone&amp;rsquo;s name servers.  A malicious actor who
is able to attach such records in a reply (i.e., spoofed packet,
fragmentation attack) can poison Unbound&amp;rsquo;s cache for the delegation
point.&lt;/p&gt;
&lt;p&gt;The fix scrubs unsolicited NS RRSets (and their respective address
records) from replies, thereby mitigating the possible poison effect.
The protection can be turned off by setting the new configuration option
&amp;ldquo;iter-scrub-promiscuous&amp;rdquo; to &amp;ldquo;no&amp;rdquo;, see
&lt;a href=&#34;https://manpages.debian.org/unbound.conf.5.html&#34;&gt;unbound.conf(5)&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1566-1 pure-ftpd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1566-1-pure-ftpd/</link>
      <pubDate>Mon, 03 Nov 2025 19:27:42 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1566-1-pure-ftpd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1566-1-pure-ftpd/">
      
&lt;p&gt;Package : pure-ftpd&lt;/p&gt;


&lt;p&gt;Version : 1.0.47-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20176&#34;&gt;CVE-2019-20176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-9274&#34;&gt;CVE-2020-9274&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-9365&#34;&gt;CVE-2020-9365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40524&#34;&gt;CVE-2021-40524&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in pure-ftpd, a secure and efficient FTP server,
that could lead to data corruption, information disclosure or program crash.&lt;/p&gt;
&lt;p&gt;CVE-2019-20176:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Stack exhaustion in the listdir function in ls.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-9274:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Uninitialized pointer in the diraliases linked list.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-9365:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds (OOB) read in the pure_strcmp function in utils.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40524:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect max_filesize quota mechanism in the server allows adversaries to
upload files of unbounded size.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1565-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1565-1-git/</link>
      <pubDate>Fri, 31 Oct 2025 16:31:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1565-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1565-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.11.0-3&amp;#43;deb9u13 (stretch), 1:2.20.1-2&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27613&#34;&gt;CVE-2025-27613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46835&#34;&gt;CVE-2025-46835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48384&#34;&gt;CVE-2025-48384&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in git, the distributed revision
control system.&lt;/p&gt;
&lt;p&gt;CVE-2025-27613&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when
a user clones an untrusted repository and runs gitk without additional
command arguments, files for which the user has write permission can be
created and truncated.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-46835&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Git GUI allows you to use the Git source control management tools via a GUI.
When a user clones an untrusted repository and is tricked into editing a
file located in a maliciously named directory in the repository, then Git
GUI can create and overwrite files for which the user has write permission.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-48384&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When reading a config value, Git strips any trailing carriage return and line
feed (CRLF). When writing a config entry, values with a trailing CR are not
quoted, causing the CR to be lost when the config is later read. When
initializing a submodule, if the submodule path contains a trailing CR, the
altered path is read resulting in the submodule being checked out to an
incorrect location. If a symlink exists that points the altered path to the
submodule hooks directory, and the submodule contains an executable
post-checkout hook, the script may be unintentionally executed after checkout.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1564-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1564-1-qemu/</link>
      <pubDate>Thu, 30 Oct 2025 15:52:21 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1564-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1564-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.8&amp;#43;dfsg-6&amp;#43;deb9u20 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3019&#34;&gt;CVE-2023-3019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3447&#34;&gt;CVE-2024-3447&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in QEMU, a fast processor
emulator, that could result in denial of service, information leak, or
privilege escalation.&lt;/p&gt;
&lt;p&gt;CVE-2023-3019&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use-after-free error in the e1000e NIC emulation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-3447&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based buffer overflow in SDHCI device emulation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update also removes the usage of the C (Credential) flag for the
binfmt_misc registration within the qemu-user-static (and qemu-user-binfmt)
packages, as it allowed for privilege escalation when running a suid/sgid binary
under qemu-user.  This means suid/sgid foreign-architecture binaries are not
running with elevated privileges under qemu-user anymore.  If you relied on
this behavior of qemu-user in the past (running suid/sgid foreign-arch
binaries), this will require changes to your deployment.&lt;/p&gt;
&lt;p&gt;In Debian 9 &amp;ldquo;stretch&amp;rdquo;, the affected packages are qemu-user-static (and
qemu-user-binfmt).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1562-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1562-1-ghostscript/</link>
      <pubDate>Thu, 30 Oct 2025 16:20:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1562-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1562-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb9u15 (stretch), 9.27~dfsg-2&amp;#43;deb10u12 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-59798&#34;&gt;CVE-2025-59798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-59799&#34;&gt;CVE-2025-59799&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Ghostscript incorrectly handled some PDF files. An
attacker could use this issue to cause Ghostscript to crash, resulting in
a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1563-1 openssl1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1563-1-openssl1.0/</link>
      <pubDate>Thu, 30 Oct 2025 09:50:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1563-1-openssl1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1563-1-openssl1.0/">
      
&lt;p&gt;Package : openssl1.0&lt;/p&gt;


&lt;p&gt;Version : 1.0.2u-1~deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9230&#34;&gt;CVE-2025-9230&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Stanislav Fort discovered an out of bounds read and write issue when
decrypting CMS messages that were encrypted using password based
encryption.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1561-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1561-1-xorg-server/</link>
      <pubDate>Wed, 29 Oct 2025 18:50:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1561-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1561-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.19.2-1&amp;#43;deb9u23 (stretch), 2:1.20.4-1&amp;#43;deb10u18 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-62229&#34;&gt;CVE-2025-62229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-62230&#34;&gt;CVE-2025-62230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-62231&#34;&gt;CVE-2025-62231&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server,
which may result in privilege escalation if the X server is running
privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1560-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1560-1-intel-microcode/</link>
      <pubDate>Wed, 29 Oct 2025 17:19:16 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1560-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1560-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20250812.1~deb9u1 (stretch), 3.20250812.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20053&#34;&gt;CVE-2025-20053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20109&#34;&gt;CVE-2025-20109&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21090&#34;&gt;CVE-2025-21090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22839&#34;&gt;CVE-2025-22839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22840&#34;&gt;CVE-2025-22840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22889&#34;&gt;CVE-2025-22889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24305&#34;&gt;CVE-2025-24305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26403&#34;&gt;CVE-2025-26403&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32086&#34;&gt;CVE-2025-32086&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for some types of Intel CPUs and
provides mitigations for security vulnerabilities which could result in
privilege escalation or denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2025-20053&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with
SGX enabled may allow a privileged user to potentially enable escalation of
privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-20109&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Isolation or Compartmentalization in the stream cache mechanism for
some Intel(R) Processors may allow an authenticated user to potentially enable
escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-21090&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Missing reference to active allocated resource for some Intel(R) Xeon(R)
processors may allow an authenticated user to potentially enable denial of
service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-22839&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient granularity of access control in the OOB-MSM for some Intel(R)
Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable
escalation of privilege via adjacent access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-22840&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sequence of processor instructions leads to unexpected behavior for some
Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to
potentially enable escalation of privilege via local access
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-22889&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper handling of overlap between protected memory ranges for some Intel(R)
Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to
potentially enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-24305&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient control flow management in the Alias Checking Trusted Module
(ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged
user to potentially enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-26403&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6
processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user
to potentially enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-32086&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improperly implemented security check for standard in the DDRIO configuration
for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX
may allow a privileged user to potentially enable escalation of privilege via
local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1559-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1559-1-openssl/</link>
      <pubDate>Wed, 29 Oct 2025 15:24:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1559-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1559-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.1.0l-1~deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9230&#34;&gt;CVE-2025-9230&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Stanislav Fort discovered an out of bounds read and write issue when
decrypting CMS messages that were encrypted using password based
encryption.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1558-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1558-1-openssl/</link>
      <pubDate>Wed, 29 Oct 2025 11:58:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1558-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1558-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.1.1n-0&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-13176&#34;&gt;CVE-2024-13176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9230&#34;&gt;CVE-2025-9230&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were found in OpenSSL, a Secure Sockets Layer toolkit:&lt;/p&gt;
&lt;p&gt;CVE-2024-13176&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A timing side-channel which could potentially allow recovering
the private key exists in the ECDSA signature computation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-9230&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1557-1 python-pip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1557-1-python-pip/</link>
      <pubDate>Wed, 29 Oct 2025 00:51:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1557-1-python-pip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1557-1-python-pip/">
      
&lt;p&gt;Package : python-pip&lt;/p&gt;


&lt;p&gt;Version : 9.0.1-2&amp;#43;deb9u3 (stretch), 18.1-5&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20916&#34;&gt;CVE-2019-20916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3572&#34;&gt;CVE-2021-3572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5752&#34;&gt;CVE-2023-5752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8869&#34;&gt;CVE-2025-8869&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in python-pip, the Python package
installer.&lt;/p&gt;
&lt;p&gt;CVE-2019-20916&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Directory traversal is possible when a URL is given in an install command,
because a Content-Disposition header can have ../ in a filename.

This issue had been fixed in Stretch already via version 9.0.1-2+deb9u2 of
python-pip (DLA-2370-1).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3572&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw exists in the way Unicode separators are handled in Git references.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When installing a package from a Mercurial VCS URL, arbitrary configuration
options could be injected to the &amp;quot;hg clone&amp;quot; call.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-8869&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pip&#39;s tar extraction doesn&#39;t check that symbolic links point to extraction
directory.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1556-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1556-1-openjdk-11/</link>
      <pubDate>Sun, 26 Oct 2025 20:48:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1556-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1556-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.29&amp;#43;6-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53057&#34;&gt;CVE-2025-53057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53066&#34;&gt;CVE-2025-53066&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in XML external entity injection attacks or incorrect
certificate validation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1555-1 request-tracker4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1555-1-request-tracker4/</link>
      <pubDate>Sun, 26 Oct 2025 12:57:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1555-1-request-tracker4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1555-1-request-tracker4/">
      
&lt;p&gt;Package : request-tracker4&lt;/p&gt;


&lt;p&gt;Version : 4.4.3-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-61873&#34;&gt;CVE-2025-61873&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Request Tracker, an extensible trouble-ticket
tracking system is prone to a CSV injection via ticket values with
special characters that are exported to a TSV from search results.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1554-1 node-form-data security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1554-1-node-form-data/</link>
      <pubDate>Sat, 25 Oct 2025 17:26:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1554-1-node-form-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1554-1-node-form-data/">
      
&lt;p&gt;Package : node-form-data&lt;/p&gt;


&lt;p&gt;Version : 2.3.2-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-7783&#34;&gt;CVE-2025-7783&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential HTTP Parameter Pollution
(HPP) issue in node-form-data, a tool to create multipart/form-data
streams module in Node.js applications.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1553-1 icedtea-web security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1553-1-icedtea-web/</link>
      <pubDate>Sat, 25 Oct 2025 15:04:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1553-1-icedtea-web/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1553-1-icedtea-web/">
      
&lt;p&gt;Package : icedtea-web&lt;/p&gt;


&lt;p&gt;Version : 1.6.2-3.1&amp;#43;deb9u2 (stretch), 1.7.2-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10181&#34;&gt;CVE-2019-10181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10182&#34;&gt;CVE-2019-10182&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10185&#34;&gt;CVE-2019-10185&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found in icedtea-web, an
implementation of the Java Network Launching Protocol (JNLP).&lt;/p&gt;
&lt;p&gt;CVE-2019-10181&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; It was found that in icedtea-web executable code could be injected
 in a JAR file without compromising the signature verification. An
 attacker could use this flaw to inject code in a trusted JAR. The
 code would be executed inside the sandbox.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10182&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; It was found that icedtea-web did not properly sanitize paths from
 &amp;lt;jar/&amp;gt; elements in JNLP files. An attacker could trick a victim
 into running a specially crafted application and use this flaw to
 upload arbitrary files to arbitrary locations in the context of the
 user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10185&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was found that icedtea-web was vulnerable to a zip-slip attack
during auto-extraction of a JAR file. An attacker could use this
flaw to write files to arbitrary locations. This could also be used
to replace the main running application and, possibly, break out of
the sandbox.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1552-1 xrdp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1552-1-xrdp/</link>
      <pubDate>Fri, 24 Oct 2025 19:35:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1552-1-xrdp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1552-1-xrdp/">
      
&lt;p&gt;Package : xrdp&lt;/p&gt;


&lt;p&gt;Version : 0.9.9-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39917&#34;&gt;CVE-2024-39917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42822&#34;&gt;CVE-2023-42822&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40184&#34;&gt;CVE-2023-40184&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Three issues found in xrdp are addressed in this update.
xrdp is an open source remote desktop protocol (RDP) server.&lt;/p&gt;
&lt;p&gt;xrdp had a vulnerability that allows attackers to make an infinite number of
login attempts. The number of max login attempts is supposed to be limited by a
configuration parameter &lt;code&gt;MaxLoginRetry&lt;/code&gt; in &lt;code&gt;/etc/xrdp/sesman.ini&lt;/code&gt;. However,
this mechanism was not effectively working. As a result, xrdp allows an
infinite number of login attempts.&lt;/p&gt;
&lt;p&gt;Access to the font glyphs in xrdp_painter.c is not bounds-checked.
Since some of this data is controllable by the user, this can result in an
out-of-bounds read within the xrdp executable. The vulnerability allows an
out-of-bounds read within a potentially privileged process. On non-Debian
platforms, xrdp tends to run as root. Potentially an out-of-bounds write can
follow the out-of-bounds read. There is no denial-of-service impact, provided that
xrdp is running in forking mode.&lt;/p&gt;
&lt;p&gt;Improper handling of session establishment errors allows bypassing OS-level
session restrictions. The &lt;code&gt;auth_start_session&lt;/code&gt; function can return non-zero (1)
value on, e.g., PAM error which may result in in session restrictions such as
max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) being
bypassed. Users (administrators) that don&amp;rsquo;t use restrictions by PAM are not
affected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1551-1 raptor2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1551-1-raptor2/</link>
      <pubDate>Wed, 22 Oct 2025 20:03:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1551-1-raptor2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1551-1-raptor2/">
      
&lt;p&gt;Package : raptor2&lt;/p&gt;


&lt;p&gt;Version : 2.0.14-1&amp;#43;deb9u3 (stretch), 2.0.14-1.1~deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57822&#34;&gt;CVE-2024-57822&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57823&#34;&gt;CVE-2024-57823&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in raptor2, an RDF parser and serializer
utilities. One issue is related to a heap-based buffer over-read when
parsing triples. The other issue is related to an integer underflow when
normalizing an URI.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1550-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1550-1-gimp/</link>
      <pubDate>Wed, 22 Oct 2025 15:22:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1550-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1550-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u5 (stretch), 2.10.8-2&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6035&#34;&gt;CVE-2025-6035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-10922&#34;&gt;CVE-2025-10922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48797&#34;&gt;CVE-2025-48797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48798&#34;&gt;CVE-2025-48798&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in GIMP, the GNU Image
Manipulation Program, which could result in denial of service or
potentially the execution of arbitrary code if malformed DICOM, TGA or
XCF images are opened, or when using the Despeckle plug-in on a very
large image.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-6035&lt;/p&gt;
&lt;p&gt;An integer overflow vulnerability exists in the GIMP &amp;ldquo;Despeckle&amp;rdquo;
plug-in. The issue occurs due to unchecked multiplication of image
dimensions, such as width, height, and bytes-per-pixel (img_bpp),
which can result in allocating insufficient memory and
subsequently performing out-of-bounds writes. This issue could
lead to heap corruption, a potential denial of service (DoS), or
arbitrary code execution in certain scenarios.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-10922&lt;/p&gt;
&lt;p&gt;ZDI-CAN-27863: GIMP DCM File Parsing Heap-based Buffer Overflow
Remote Code Execution Vulnerability&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-48797&lt;/p&gt;
&lt;p&gt;Flaw when processing certain TGA image files. If a user opens one
of these image files that has been specially crafted by an
attacker, GIMP can be tricked into making serious memory errors,
potentially leading to crashes and causing a heap buffer overflow.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-48798&lt;/p&gt;
&lt;p&gt;Flaw when processing XCF image files. If a user opens one of these
image files that has been specially crafted by an attacker, GIMP
can be tricked into making serious memory errors, potentially
leading to crashes and causing use-after-free issues.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1549-1 gegl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1549-1-gegl/</link>
      <pubDate>Wed, 22 Oct 2025 15:22:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1549-1-gegl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1549-1-gegl/">
      
&lt;p&gt;Package : gegl&lt;/p&gt;


&lt;p&gt;Version : 0.3.8-4&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10113&#34;&gt;CVE-2018-10113&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10114&#34;&gt;CVE-2018-10114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45463&#34;&gt;CVE-2021-45463&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-10921&#34;&gt;CVE-2025-10921&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in GEGL, a graph-based image
processing library, which could result in denial of service or the
execution of arbitrary code if malformed files or filenames are
processed.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-10113&lt;/p&gt;
&lt;p&gt;The process function in operations/external/ppm-load.c has
unbounded memory allocation, leading to a denial of service
(application crash) upon allocation failure.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-10114&lt;/p&gt;
&lt;p&gt;The gegl_buffer_iterate_read_simple function in
buffer/gegl-buffer-access.c allows remote attackers to cause a
denial of service (write access violation) or possibly have
unspecified other impact via a malformed PPM file, related to
improper restrictions on memory allocation in the
ppm_load_read_header function in operations/external/ppm-load.c.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-45463&lt;/p&gt;
&lt;p&gt;load_cache allows shell expansion when a pathname in a constructed
command line is not escaped or filtered. This is caused by use of
the system library function for execution of the ImageMagick
convert fallback in magick-load.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-10921&lt;/p&gt;
&lt;p&gt;GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code
Execution Vulnerability.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1548-1 gegl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1548-1-gegl/</link>
      <pubDate>Wed, 22 Oct 2025 15:22:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1548-1-gegl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1548-1-gegl/">
      
&lt;p&gt;Package : gegl&lt;/p&gt;


&lt;p&gt;Version : 0.4.12-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45463&#34;&gt;CVE-2021-45463&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-10921&#34;&gt;CVE-2025-10921&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in GEGL, a graph-based image
processing library, which could result in denial of service or the
execution of arbitrary code if malformed files or filenames are
processed.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-45463&lt;/p&gt;
&lt;p&gt;load_cache allows shell expansion when a pathname in a constructed
command line is not escaped or filtered. This is caused by use of
the system library function for execution of the ImageMagick
convert fallback in magick-load.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-10921&lt;/p&gt;
&lt;p&gt;GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code
Execution Vulnerability.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1547-1 nginx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1547-1-nginx/</link>
      <pubDate>Tue, 21 Oct 2025 20:18:47 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1547-1-nginx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1547-1-nginx/">
      
&lt;p&gt;Package : nginx&lt;/p&gt;


&lt;p&gt;Version : 1.10.3-1&amp;#43;deb9u9 (stretch), 1.14.2-2&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7347&#34;&gt;CVE-2024-7347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33452&#34;&gt;CVE-2024-33452&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23419&#34;&gt;CVE-2025-23419&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in nginx a popular webserver.&lt;/p&gt;
&lt;p&gt;CVE-2024-7347&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in the ngx_http_mp4_module,
This vulnerability might allow an attacker to over-read NGINX
worker memory resulting in its termination, using a specially crafted mp4 file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-33452&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in the lua-nginx-module.
This vulnerability allows a remote attacker to conduct HTTP request smuggling
via a crafted HEAD request.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-23419&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When multiple server blocks are configured to share the same IP address and port,
an attacker can use session resumption to bypass client certificate authentication
requirements on these servers.
This vulnerability arises when TLS Session Tickets are used and/or the SSL session cache
are used in the default server and the default server is performing
client certificate authentication&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1546-1 libphp-adodb security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1546-1-libphp-adodb/</link>
      <pubDate>Mon, 20 Oct 2025 22:56:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1546-1-libphp-adodb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1546-1-libphp-adodb/">
      
&lt;p&gt;Package : libphp-adodb&lt;/p&gt;


&lt;p&gt;Version : 5.20.9-1&amp;#43;deb9u3 (stretch), 5.20.14-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54119&#34;&gt;CVE-2025-54119&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Improper escaping of a query parameter may allow an attacker to execute arbitrary
SQL statements (SQL injection) when the code using ADOdb connects to a sqlite3 or sqlite database
and calls the metaColumns(), metaForeignKeys() or metaIndexes() methods with a crafted table name.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1545-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1545-1-imagemagick/</link>
      <pubDate>Mon, 20 Oct 2025 09:52:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1545-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1545-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u23 (stretch), 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u12 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-62171&#34;&gt;CVE-2025-62171&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow vulnerability was discovered in the ReadBMP() function
of the BMP decoder within ImageMagick.&lt;/p&gt;
&lt;p&gt;Although CVE-2025-57803 was issued to address this flaw,
the proposed fix is incomplete and fails to prevent exploitation in
certain scenarios. Specifically, the patch introduces a BMPOverflowCheck()
function in some code path, but it is invoked only after the overflow
has already occurred—rendering in some case.&lt;/p&gt;
&lt;p&gt;This oversight allows a specially crafted 58-byte BMP file to trigger
AddressSanitizer crashes, potentially leading to denial-of-service (DoS) conditions.&lt;/p&gt;
&lt;p&gt;This new issue was designated CVE-2025-62171.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1544-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1544-1-linux-5.10/</link>
      <pubDate>Fri, 17 Oct 2025 17:53:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1544-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1544-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.244-1~deb9u1 (stretch), 5.10.244-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46987&#34;&gt;CVE-2021-46987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47037&#34;&gt;CVE-2021-47037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47070&#34;&gt;CVE-2021-47070&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47076&#34;&gt;CVE-2021-47076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47183&#34;&gt;CVE-2021-47183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47193&#34;&gt;CVE-2021-47193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47412&#34;&gt;CVE-2021-47412&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47421&#34;&gt;CVE-2021-47421&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47455&#34;&gt;CVE-2021-47455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47498&#34;&gt;CVE-2021-47498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21546&#34;&gt;CVE-2022-21546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49063&#34;&gt;CVE-2022-49063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-50327&#34;&gt;CVE-2022-50327&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52935&#34;&gt;CVE-2023-52935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-53259&#34;&gt;CVE-2023-53259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26739&#34;&gt;CVE-2024-26739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28956&#34;&gt;CVE-2024-28956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35790&#34;&gt;CVE-2024-35790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36350&#34;&gt;CVE-2024-36350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36357&#34;&gt;CVE-2024-36357&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38541&#34;&gt;CVE-2024-38541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43863&#34;&gt;CVE-2024-43863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46751&#34;&gt;CVE-2024-46751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46855&#34;&gt;CVE-2024-46855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49935&#34;&gt;CVE-2024-49935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53203&#34;&gt;CVE-2024-53203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57883&#34;&gt;CVE-2024-57883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57996&#34;&gt;CVE-2024-57996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21912&#34;&gt;CVE-2025-21912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37798&#34;&gt;CVE-2025-37798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37819&#34;&gt;CVE-2025-37819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37890&#34;&gt;CVE-2025-37890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37909&#34;&gt;CVE-2025-37909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37913&#34;&gt;CVE-2025-37913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37914&#34;&gt;CVE-2025-37914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37915&#34;&gt;CVE-2025-37915&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37923&#34;&gt;CVE-2025-37923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37927&#34;&gt;CVE-2025-37927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37930&#34;&gt;CVE-2025-37930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37932&#34;&gt;CVE-2025-37932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37948&#34;&gt;CVE-2025-37948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37949&#34;&gt;CVE-2025-37949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37958&#34;&gt;CVE-2025-37958&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37963&#34;&gt;CVE-2025-37963&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37968&#34;&gt;CVE-2025-37968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37969&#34;&gt;CVE-2025-37969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37970&#34;&gt;CVE-2025-37970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37990&#34;&gt;CVE-2025-37990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37992&#34;&gt;CVE-2025-37992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37994&#34;&gt;CVE-2025-37994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37995&#34;&gt;CVE-2025-37995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37997&#34;&gt;CVE-2025-37997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37998&#34;&gt;CVE-2025-37998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38000&#34;&gt;CVE-2025-38000&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38001&#34;&gt;CVE-2025-38001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38003&#34;&gt;CVE-2025-38003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38004&#34;&gt;CVE-2025-38004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38005&#34;&gt;CVE-2025-38005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38009&#34;&gt;CVE-2025-38009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38023&#34;&gt;CVE-2025-38023&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38024&#34;&gt;CVE-2025-38024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38031&#34;&gt;CVE-2025-38031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38034&#34;&gt;CVE-2025-38034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38035&#34;&gt;CVE-2025-38035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38037&#34;&gt;CVE-2025-38037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38044&#34;&gt;CVE-2025-38044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38051&#34;&gt;CVE-2025-38051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38052&#34;&gt;CVE-2025-38052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38058&#34;&gt;CVE-2025-38058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38061&#34;&gt;CVE-2025-38061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38065&#34;&gt;CVE-2025-38065&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38066&#34;&gt;CVE-2025-38066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38067&#34;&gt;CVE-2025-38067&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38072&#34;&gt;CVE-2025-38072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38074&#34;&gt;CVE-2025-38074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38075&#34;&gt;CVE-2025-38075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38078&#34;&gt;CVE-2025-38078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38079&#34;&gt;CVE-2025-38079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38083&#34;&gt;CVE-2025-38083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38084&#34;&gt;CVE-2025-38084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38085&#34;&gt;CVE-2025-38085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38086&#34;&gt;CVE-2025-38086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38090&#34;&gt;CVE-2025-38090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38094&#34;&gt;CVE-2025-38094&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38095&#34;&gt;CVE-2025-38095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38100&#34;&gt;CVE-2025-38100&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38102&#34;&gt;CVE-2025-38102&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38103&#34;&gt;CVE-2025-38103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38107&#34;&gt;CVE-2025-38107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38108&#34;&gt;CVE-2025-38108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38111&#34;&gt;CVE-2025-38111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38112&#34;&gt;CVE-2025-38112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38115&#34;&gt;CVE-2025-38115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38135&#34;&gt;CVE-2025-38135&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38136&#34;&gt;CVE-2025-38136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38138&#34;&gt;CVE-2025-38138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38143&#34;&gt;CVE-2025-38143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38145&#34;&gt;CVE-2025-38145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38146&#34;&gt;CVE-2025-38146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38147&#34;&gt;CVE-2025-38147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38153&#34;&gt;CVE-2025-38153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38157&#34;&gt;CVE-2025-38157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38160&#34;&gt;CVE-2025-38160&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38161&#34;&gt;CVE-2025-38161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38163&#34;&gt;CVE-2025-38163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38173&#34;&gt;CVE-2025-38173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38174&#34;&gt;CVE-2025-38174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38177&#34;&gt;CVE-2025-38177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38180&#34;&gt;CVE-2025-38180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38181&#34;&gt;CVE-2025-38181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38184&#34;&gt;CVE-2025-38184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38185&#34;&gt;CVE-2025-38185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38190&#34;&gt;CVE-2025-38190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38193&#34;&gt;CVE-2025-38193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38194&#34;&gt;CVE-2025-38194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38197&#34;&gt;CVE-2025-38197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38200&#34;&gt;CVE-2025-38200&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38203&#34;&gt;CVE-2025-38203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38204&#34;&gt;CVE-2025-38204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38206&#34;&gt;CVE-2025-38206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38211&#34;&gt;CVE-2025-38211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38212&#34;&gt;CVE-2025-38212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38214&#34;&gt;CVE-2025-38214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38218&#34;&gt;CVE-2025-38218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38219&#34;&gt;CVE-2025-38219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38222&#34;&gt;CVE-2025-38222&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38226&#34;&gt;CVE-2025-38226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38227&#34;&gt;CVE-2025-38227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38229&#34;&gt;CVE-2025-38229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38230&#34;&gt;CVE-2025-38230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38231&#34;&gt;CVE-2025-38231&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38237&#34;&gt;CVE-2025-38237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38245&#34;&gt;CVE-2025-38245&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38249&#34;&gt;CVE-2025-38249&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38251&#34;&gt;CVE-2025-38251&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38263&#34;&gt;CVE-2025-38263&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38273&#34;&gt;CVE-2025-38273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38285&#34;&gt;CVE-2025-38285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38286&#34;&gt;CVE-2025-38286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38293&#34;&gt;CVE-2025-38293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38298&#34;&gt;CVE-2025-38298&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38312&#34;&gt;CVE-2025-38312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38313&#34;&gt;CVE-2025-38313&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38320&#34;&gt;CVE-2025-38320&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38323&#34;&gt;CVE-2025-38323&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38324&#34;&gt;CVE-2025-38324&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38326&#34;&gt;CVE-2025-38326&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38328&#34;&gt;CVE-2025-38328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38332&#34;&gt;CVE-2025-38332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38336&#34;&gt;CVE-2025-38336&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38337&#34;&gt;CVE-2025-38337&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38342&#34;&gt;CVE-2025-38342&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38344&#34;&gt;CVE-2025-38344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38345&#34;&gt;CVE-2025-38345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38346&#34;&gt;CVE-2025-38346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38347&#34;&gt;CVE-2025-38347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38348&#34;&gt;CVE-2025-38348&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38350&#34;&gt;CVE-2025-38350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38352&#34;&gt;CVE-2025-38352&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38363&#34;&gt;CVE-2025-38363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38371&#34;&gt;CVE-2025-38371&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38375&#34;&gt;CVE-2025-38375&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38377&#34;&gt;CVE-2025-38377&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38386&#34;&gt;CVE-2025-38386&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38387&#34;&gt;CVE-2025-38387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38389&#34;&gt;CVE-2025-38389&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38391&#34;&gt;CVE-2025-38391&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38393&#34;&gt;CVE-2025-38393&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38395&#34;&gt;CVE-2025-38395&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38399&#34;&gt;CVE-2025-38399&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38400&#34;&gt;CVE-2025-38400&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38401&#34;&gt;CVE-2025-38401&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38403&#34;&gt;CVE-2025-38403&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38404&#34;&gt;CVE-2025-38404&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38406&#34;&gt;CVE-2025-38406&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38415&#34;&gt;CVE-2025-38415&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38416&#34;&gt;CVE-2025-38416&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38420&#34;&gt;CVE-2025-38420&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38424&#34;&gt;CVE-2025-38424&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38428&#34;&gt;CVE-2025-38428&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38430&#34;&gt;CVE-2025-38430&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38439&#34;&gt;CVE-2025-38439&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38445&#34;&gt;CVE-2025-38445&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38448&#34;&gt;CVE-2025-38448&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38457&#34;&gt;CVE-2025-38457&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38458&#34;&gt;CVE-2025-38458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38459&#34;&gt;CVE-2025-38459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38460&#34;&gt;CVE-2025-38460&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38461&#34;&gt;CVE-2025-38461&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38462&#34;&gt;CVE-2025-38462&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38464&#34;&gt;CVE-2025-38464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38465&#34;&gt;CVE-2025-38465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38466&#34;&gt;CVE-2025-38466&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38467&#34;&gt;CVE-2025-38467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38468&#34;&gt;CVE-2025-38468&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38470&#34;&gt;CVE-2025-38470&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38473&#34;&gt;CVE-2025-38473&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38474&#34;&gt;CVE-2025-38474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38476&#34;&gt;CVE-2025-38476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38477&#34;&gt;CVE-2025-38477&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38478&#34;&gt;CVE-2025-38478&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38480&#34;&gt;CVE-2025-38480&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38481&#34;&gt;CVE-2025-38481&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38482&#34;&gt;CVE-2025-38482&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38483&#34;&gt;CVE-2025-38483&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38487&#34;&gt;CVE-2025-38487&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38488&#34;&gt;CVE-2025-38488&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38494&#34;&gt;CVE-2025-38494&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38495&#34;&gt;CVE-2025-38495&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38497&#34;&gt;CVE-2025-38497&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38498&#34;&gt;CVE-2025-38498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38513&#34;&gt;CVE-2025-38513&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38514&#34;&gt;CVE-2025-38514&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38515&#34;&gt;CVE-2025-38515&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38516&#34;&gt;CVE-2025-38516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38529&#34;&gt;CVE-2025-38529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38530&#34;&gt;CVE-2025-38530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38535&#34;&gt;CVE-2025-38535&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38538&#34;&gt;CVE-2025-38538&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38539&#34;&gt;CVE-2025-38539&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38540&#34;&gt;CVE-2025-38540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38542&#34;&gt;CVE-2025-38542&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38546&#34;&gt;CVE-2025-38546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38548&#34;&gt;CVE-2025-38548&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38553&#34;&gt;CVE-2025-38553&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38555&#34;&gt;CVE-2025-38555&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38563&#34;&gt;CVE-2025-38563&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38565&#34;&gt;CVE-2025-38565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38569&#34;&gt;CVE-2025-38569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38572&#34;&gt;CVE-2025-38572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38574&#34;&gt;CVE-2025-38574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38577&#34;&gt;CVE-2025-38577&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38578&#34;&gt;CVE-2025-38578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38581&#34;&gt;CVE-2025-38581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38601&#34;&gt;CVE-2025-38601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38602&#34;&gt;CVE-2025-38602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38604&#34;&gt;CVE-2025-38604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38608&#34;&gt;CVE-2025-38608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38612&#34;&gt;CVE-2025-38612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38617&#34;&gt;CVE-2025-38617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38618&#34;&gt;CVE-2025-38618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38622&#34;&gt;CVE-2025-38622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38635&#34;&gt;CVE-2025-38635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38639&#34;&gt;CVE-2025-38639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38650&#34;&gt;CVE-2025-38650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38652&#34;&gt;CVE-2025-38652&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38663&#34;&gt;CVE-2025-38663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38664&#34;&gt;CVE-2025-38664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38666&#34;&gt;CVE-2025-38666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38668&#34;&gt;CVE-2025-38668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38671&#34;&gt;CVE-2025-38671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38676&#34;&gt;CVE-2025-38676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38677&#34;&gt;CVE-2025-38677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38680&#34;&gt;CVE-2025-38680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38681&#34;&gt;CVE-2025-38681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38683&#34;&gt;CVE-2025-38683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38684&#34;&gt;CVE-2025-38684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38687&#34;&gt;CVE-2025-38687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38691&#34;&gt;CVE-2025-38691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38693&#34;&gt;CVE-2025-38693&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38694&#34;&gt;CVE-2025-38694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38695&#34;&gt;CVE-2025-38695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38697&#34;&gt;CVE-2025-38697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38698&#34;&gt;CVE-2025-38698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38699&#34;&gt;CVE-2025-38699&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38700&#34;&gt;CVE-2025-38700&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38701&#34;&gt;CVE-2025-38701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38706&#34;&gt;CVE-2025-38706&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38708&#34;&gt;CVE-2025-38708&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38712&#34;&gt;CVE-2025-38712&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38713&#34;&gt;CVE-2025-38713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38714&#34;&gt;CVE-2025-38714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38715&#34;&gt;CVE-2025-38715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38718&#34;&gt;CVE-2025-38718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38721&#34;&gt;CVE-2025-38721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38724&#34;&gt;CVE-2025-38724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38727&#34;&gt;CVE-2025-38727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38729&#34;&gt;CVE-2025-38729&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38732&#34;&gt;CVE-2025-38732&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39676&#34;&gt;CVE-2025-39676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39681&#34;&gt;CVE-2025-39681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39683&#34;&gt;CVE-2025-39683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39687&#34;&gt;CVE-2025-39687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39689&#34;&gt;CVE-2025-39689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39691&#34;&gt;CVE-2025-39691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39697&#34;&gt;CVE-2025-39697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39703&#34;&gt;CVE-2025-39703&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39709&#34;&gt;CVE-2025-39709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39710&#34;&gt;CVE-2025-39710&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39713&#34;&gt;CVE-2025-39713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39714&#34;&gt;CVE-2025-39714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39724&#34;&gt;CVE-2025-39724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39730&#34;&gt;CVE-2025-39730&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39736&#34;&gt;CVE-2025-39736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39737&#34;&gt;CVE-2025-39737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39742&#34;&gt;CVE-2025-39742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39743&#34;&gt;CVE-2025-39743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39749&#34;&gt;CVE-2025-39749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39752&#34;&gt;CVE-2025-39752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39756&#34;&gt;CVE-2025-39756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39757&#34;&gt;CVE-2025-39757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39760&#34;&gt;CVE-2025-39760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39766&#34;&gt;CVE-2025-39766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39782&#34;&gt;CVE-2025-39782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39783&#34;&gt;CVE-2025-39783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39787&#34;&gt;CVE-2025-39787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39788&#34;&gt;CVE-2025-39788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39794&#34;&gt;CVE-2025-39794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39795&#34;&gt;CVE-2025-39795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39798&#34;&gt;CVE-2025-39798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39808&#34;&gt;CVE-2025-39808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39812&#34;&gt;CVE-2025-39812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39813&#34;&gt;CVE-2025-39813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39817&#34;&gt;CVE-2025-39817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39823&#34;&gt;CVE-2025-39823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39824&#34;&gt;CVE-2025-39824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39828&#34;&gt;CVE-2025-39828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39835&#34;&gt;CVE-2025-39835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39839&#34;&gt;CVE-2025-39839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39841&#34;&gt;CVE-2025-39841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39846&#34;&gt;CVE-2025-39846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39847&#34;&gt;CVE-2025-39847&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39848&#34;&gt;CVE-2025-39848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39853&#34;&gt;CVE-2025-39853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39860&#34;&gt;CVE-2025-39860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39864&#34;&gt;CVE-2025-39864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39865&#34;&gt;CVE-2025-39865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39891&#34;&gt;CVE-2025-39891&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39898&#34;&gt;CVE-2025-39898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39902&#34;&gt;CVE-2025-39902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39920&#34;&gt;CVE-2025-39920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40300&#34;&gt;CVE-2025-40300&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;Starting with this version, modules are signed with an ephemeral key
on all architectures. This version additionally includes many more
bug fixes from stable updates 5.10.238 through 5.10.244.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1543-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1543-1-linux-6.1/</link>
      <pubDate>Thu, 16 Oct 2025 13:05:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1543-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1543-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.153-1~deb9u1 (stretch), 6.1.153-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46987&#34;&gt;CVE-2021-46987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47037&#34;&gt;CVE-2021-47037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47070&#34;&gt;CVE-2021-47070&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47076&#34;&gt;CVE-2021-47076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47183&#34;&gt;CVE-2021-47183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47193&#34;&gt;CVE-2021-47193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47412&#34;&gt;CVE-2021-47412&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47421&#34;&gt;CVE-2021-47421&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47455&#34;&gt;CVE-2021-47455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47498&#34;&gt;CVE-2021-47498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21546&#34;&gt;CVE-2022-21546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49063&#34;&gt;CVE-2022-49063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-50327&#34;&gt;CVE-2022-50327&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52935&#34;&gt;CVE-2023-52935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-53259&#34;&gt;CVE-2023-53259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26739&#34;&gt;CVE-2024-26739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28956&#34;&gt;CVE-2024-28956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35790&#34;&gt;CVE-2024-35790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36350&#34;&gt;CVE-2024-36350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36357&#34;&gt;CVE-2024-36357&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38541&#34;&gt;CVE-2024-38541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43863&#34;&gt;CVE-2024-43863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46751&#34;&gt;CVE-2024-46751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46855&#34;&gt;CVE-2024-46855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49935&#34;&gt;CVE-2024-49935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53203&#34;&gt;CVE-2024-53203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57883&#34;&gt;CVE-2024-57883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57996&#34;&gt;CVE-2024-57996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21912&#34;&gt;CVE-2025-21912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37798&#34;&gt;CVE-2025-37798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37819&#34;&gt;CVE-2025-37819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37890&#34;&gt;CVE-2025-37890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37909&#34;&gt;CVE-2025-37909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37913&#34;&gt;CVE-2025-37913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37914&#34;&gt;CVE-2025-37914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37915&#34;&gt;CVE-2025-37915&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37923&#34;&gt;CVE-2025-37923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37927&#34;&gt;CVE-2025-37927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37930&#34;&gt;CVE-2025-37930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37932&#34;&gt;CVE-2025-37932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37948&#34;&gt;CVE-2025-37948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37949&#34;&gt;CVE-2025-37949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37958&#34;&gt;CVE-2025-37958&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37963&#34;&gt;CVE-2025-37963&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37968&#34;&gt;CVE-2025-37968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37969&#34;&gt;CVE-2025-37969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37970&#34;&gt;CVE-2025-37970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37990&#34;&gt;CVE-2025-37990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37992&#34;&gt;CVE-2025-37992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37994&#34;&gt;CVE-2025-37994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37995&#34;&gt;CVE-2025-37995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37997&#34;&gt;CVE-2025-37997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37998&#34;&gt;CVE-2025-37998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38000&#34;&gt;CVE-2025-38000&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38001&#34;&gt;CVE-2025-38001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38003&#34;&gt;CVE-2025-38003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38004&#34;&gt;CVE-2025-38004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38005&#34;&gt;CVE-2025-38005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38009&#34;&gt;CVE-2025-38009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38023&#34;&gt;CVE-2025-38023&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38024&#34;&gt;CVE-2025-38024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38031&#34;&gt;CVE-2025-38031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38034&#34;&gt;CVE-2025-38034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38035&#34;&gt;CVE-2025-38035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38037&#34;&gt;CVE-2025-38037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38044&#34;&gt;CVE-2025-38044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38051&#34;&gt;CVE-2025-38051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38052&#34;&gt;CVE-2025-38052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38058&#34;&gt;CVE-2025-38058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38061&#34;&gt;CVE-2025-38061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38065&#34;&gt;CVE-2025-38065&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38066&#34;&gt;CVE-2025-38066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38067&#34;&gt;CVE-2025-38067&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38072&#34;&gt;CVE-2025-38072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38074&#34;&gt;CVE-2025-38074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38075&#34;&gt;CVE-2025-38075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38078&#34;&gt;CVE-2025-38078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38079&#34;&gt;CVE-2025-38079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38083&#34;&gt;CVE-2025-38083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38084&#34;&gt;CVE-2025-38084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38085&#34;&gt;CVE-2025-38085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38086&#34;&gt;CVE-2025-38086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38090&#34;&gt;CVE-2025-38090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38094&#34;&gt;CVE-2025-38094&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38095&#34;&gt;CVE-2025-38095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38100&#34;&gt;CVE-2025-38100&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38102&#34;&gt;CVE-2025-38102&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38103&#34;&gt;CVE-2025-38103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38107&#34;&gt;CVE-2025-38107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38108&#34;&gt;CVE-2025-38108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38111&#34;&gt;CVE-2025-38111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38112&#34;&gt;CVE-2025-38112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38115&#34;&gt;CVE-2025-38115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38135&#34;&gt;CVE-2025-38135&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38136&#34;&gt;CVE-2025-38136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38138&#34;&gt;CVE-2025-38138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38143&#34;&gt;CVE-2025-38143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38145&#34;&gt;CVE-2025-38145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38146&#34;&gt;CVE-2025-38146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38147&#34;&gt;CVE-2025-38147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38153&#34;&gt;CVE-2025-38153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38157&#34;&gt;CVE-2025-38157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38160&#34;&gt;CVE-2025-38160&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38161&#34;&gt;CVE-2025-38161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38163&#34;&gt;CVE-2025-38163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38173&#34;&gt;CVE-2025-38173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38174&#34;&gt;CVE-2025-38174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38177&#34;&gt;CVE-2025-38177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38180&#34;&gt;CVE-2025-38180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38181&#34;&gt;CVE-2025-38181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38184&#34;&gt;CVE-2025-38184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38185&#34;&gt;CVE-2025-38185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38190&#34;&gt;CVE-2025-38190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38193&#34;&gt;CVE-2025-38193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38194&#34;&gt;CVE-2025-38194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38197&#34;&gt;CVE-2025-38197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38200&#34;&gt;CVE-2025-38200&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38203&#34;&gt;CVE-2025-38203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38204&#34;&gt;CVE-2025-38204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38206&#34;&gt;CVE-2025-38206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38211&#34;&gt;CVE-2025-38211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38212&#34;&gt;CVE-2025-38212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38214&#34;&gt;CVE-2025-38214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38218&#34;&gt;CVE-2025-38218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38219&#34;&gt;CVE-2025-38219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38222&#34;&gt;CVE-2025-38222&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38226&#34;&gt;CVE-2025-38226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38227&#34;&gt;CVE-2025-38227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38229&#34;&gt;CVE-2025-38229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38230&#34;&gt;CVE-2025-38230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38231&#34;&gt;CVE-2025-38231&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38237&#34;&gt;CVE-2025-38237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38245&#34;&gt;CVE-2025-38245&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38249&#34;&gt;CVE-2025-38249&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38251&#34;&gt;CVE-2025-38251&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38263&#34;&gt;CVE-2025-38263&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38273&#34;&gt;CVE-2025-38273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38285&#34;&gt;CVE-2025-38285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38286&#34;&gt;CVE-2025-38286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38293&#34;&gt;CVE-2025-38293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38298&#34;&gt;CVE-2025-38298&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38312&#34;&gt;CVE-2025-38312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38313&#34;&gt;CVE-2025-38313&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38320&#34;&gt;CVE-2025-38320&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38323&#34;&gt;CVE-2025-38323&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38324&#34;&gt;CVE-2025-38324&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38326&#34;&gt;CVE-2025-38326&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38328&#34;&gt;CVE-2025-38328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38332&#34;&gt;CVE-2025-38332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38336&#34;&gt;CVE-2025-38336&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38337&#34;&gt;CVE-2025-38337&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38342&#34;&gt;CVE-2025-38342&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38344&#34;&gt;CVE-2025-38344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38345&#34;&gt;CVE-2025-38345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38346&#34;&gt;CVE-2025-38346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38347&#34;&gt;CVE-2025-38347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38348&#34;&gt;CVE-2025-38348&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38350&#34;&gt;CVE-2025-38350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38352&#34;&gt;CVE-2025-38352&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38363&#34;&gt;CVE-2025-38363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38371&#34;&gt;CVE-2025-38371&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38375&#34;&gt;CVE-2025-38375&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38377&#34;&gt;CVE-2025-38377&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38386&#34;&gt;CVE-2025-38386&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38387&#34;&gt;CVE-2025-38387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38389&#34;&gt;CVE-2025-38389&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38391&#34;&gt;CVE-2025-38391&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38393&#34;&gt;CVE-2025-38393&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38395&#34;&gt;CVE-2025-38395&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38399&#34;&gt;CVE-2025-38399&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38400&#34;&gt;CVE-2025-38400&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38401&#34;&gt;CVE-2025-38401&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38403&#34;&gt;CVE-2025-38403&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38404&#34;&gt;CVE-2025-38404&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38406&#34;&gt;CVE-2025-38406&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38415&#34;&gt;CVE-2025-38415&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38416&#34;&gt;CVE-2025-38416&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38420&#34;&gt;CVE-2025-38420&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38424&#34;&gt;CVE-2025-38424&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38428&#34;&gt;CVE-2025-38428&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38430&#34;&gt;CVE-2025-38430&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38439&#34;&gt;CVE-2025-38439&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38445&#34;&gt;CVE-2025-38445&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38448&#34;&gt;CVE-2025-38448&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38457&#34;&gt;CVE-2025-38457&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38458&#34;&gt;CVE-2025-38458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38459&#34;&gt;CVE-2025-38459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38460&#34;&gt;CVE-2025-38460&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38461&#34;&gt;CVE-2025-38461&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38462&#34;&gt;CVE-2025-38462&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38464&#34;&gt;CVE-2025-38464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38465&#34;&gt;CVE-2025-38465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38466&#34;&gt;CVE-2025-38466&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38467&#34;&gt;CVE-2025-38467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38468&#34;&gt;CVE-2025-38468&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38470&#34;&gt;CVE-2025-38470&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38473&#34;&gt;CVE-2025-38473&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38474&#34;&gt;CVE-2025-38474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38476&#34;&gt;CVE-2025-38476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38477&#34;&gt;CVE-2025-38477&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38478&#34;&gt;CVE-2025-38478&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38480&#34;&gt;CVE-2025-38480&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38481&#34;&gt;CVE-2025-38481&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38482&#34;&gt;CVE-2025-38482&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38483&#34;&gt;CVE-2025-38483&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38487&#34;&gt;CVE-2025-38487&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38488&#34;&gt;CVE-2025-38488&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38494&#34;&gt;CVE-2025-38494&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38495&#34;&gt;CVE-2025-38495&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38497&#34;&gt;CVE-2025-38497&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38498&#34;&gt;CVE-2025-38498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38513&#34;&gt;CVE-2025-38513&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38514&#34;&gt;CVE-2025-38514&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38515&#34;&gt;CVE-2025-38515&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38516&#34;&gt;CVE-2025-38516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38529&#34;&gt;CVE-2025-38529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38530&#34;&gt;CVE-2025-38530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38535&#34;&gt;CVE-2025-38535&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38538&#34;&gt;CVE-2025-38538&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38539&#34;&gt;CVE-2025-38539&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38540&#34;&gt;CVE-2025-38540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38542&#34;&gt;CVE-2025-38542&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38546&#34;&gt;CVE-2025-38546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38548&#34;&gt;CVE-2025-38548&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38553&#34;&gt;CVE-2025-38553&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38555&#34;&gt;CVE-2025-38555&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38563&#34;&gt;CVE-2025-38563&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38565&#34;&gt;CVE-2025-38565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38569&#34;&gt;CVE-2025-38569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38572&#34;&gt;CVE-2025-38572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38574&#34;&gt;CVE-2025-38574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38577&#34;&gt;CVE-2025-38577&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38578&#34;&gt;CVE-2025-38578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38581&#34;&gt;CVE-2025-38581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38601&#34;&gt;CVE-2025-38601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38602&#34;&gt;CVE-2025-38602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38604&#34;&gt;CVE-2025-38604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38608&#34;&gt;CVE-2025-38608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38612&#34;&gt;CVE-2025-38612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38617&#34;&gt;CVE-2025-38617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38618&#34;&gt;CVE-2025-38618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38622&#34;&gt;CVE-2025-38622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38635&#34;&gt;CVE-2025-38635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38639&#34;&gt;CVE-2025-38639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38650&#34;&gt;CVE-2025-38650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38652&#34;&gt;CVE-2025-38652&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38663&#34;&gt;CVE-2025-38663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38664&#34;&gt;CVE-2025-38664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38666&#34;&gt;CVE-2025-38666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38668&#34;&gt;CVE-2025-38668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38671&#34;&gt;CVE-2025-38671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38676&#34;&gt;CVE-2025-38676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38677&#34;&gt;CVE-2025-38677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38680&#34;&gt;CVE-2025-38680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38681&#34;&gt;CVE-2025-38681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38683&#34;&gt;CVE-2025-38683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38684&#34;&gt;CVE-2025-38684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38687&#34;&gt;CVE-2025-38687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38691&#34;&gt;CVE-2025-38691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38693&#34;&gt;CVE-2025-38693&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38694&#34;&gt;CVE-2025-38694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38695&#34;&gt;CVE-2025-38695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38697&#34;&gt;CVE-2025-38697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38698&#34;&gt;CVE-2025-38698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38699&#34;&gt;CVE-2025-38699&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38700&#34;&gt;CVE-2025-38700&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38701&#34;&gt;CVE-2025-38701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38706&#34;&gt;CVE-2025-38706&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38708&#34;&gt;CVE-2025-38708&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38712&#34;&gt;CVE-2025-38712&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38713&#34;&gt;CVE-2025-38713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38714&#34;&gt;CVE-2025-38714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38715&#34;&gt;CVE-2025-38715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38718&#34;&gt;CVE-2025-38718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38721&#34;&gt;CVE-2025-38721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38724&#34;&gt;CVE-2025-38724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38727&#34;&gt;CVE-2025-38727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38729&#34;&gt;CVE-2025-38729&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38732&#34;&gt;CVE-2025-38732&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39676&#34;&gt;CVE-2025-39676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39681&#34;&gt;CVE-2025-39681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39683&#34;&gt;CVE-2025-39683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39687&#34;&gt;CVE-2025-39687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39689&#34;&gt;CVE-2025-39689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39691&#34;&gt;CVE-2025-39691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39697&#34;&gt;CVE-2025-39697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39703&#34;&gt;CVE-2025-39703&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39709&#34;&gt;CVE-2025-39709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39710&#34;&gt;CVE-2025-39710&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39713&#34;&gt;CVE-2025-39713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39714&#34;&gt;CVE-2025-39714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39724&#34;&gt;CVE-2025-39724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39730&#34;&gt;CVE-2025-39730&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39736&#34;&gt;CVE-2025-39736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39737&#34;&gt;CVE-2025-39737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39742&#34;&gt;CVE-2025-39742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39743&#34;&gt;CVE-2025-39743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39749&#34;&gt;CVE-2025-39749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39752&#34;&gt;CVE-2025-39752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39756&#34;&gt;CVE-2025-39756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39757&#34;&gt;CVE-2025-39757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39760&#34;&gt;CVE-2025-39760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39766&#34;&gt;CVE-2025-39766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39782&#34;&gt;CVE-2025-39782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39783&#34;&gt;CVE-2025-39783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39787&#34;&gt;CVE-2025-39787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39788&#34;&gt;CVE-2025-39788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39794&#34;&gt;CVE-2025-39794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39795&#34;&gt;CVE-2025-39795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39798&#34;&gt;CVE-2025-39798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39808&#34;&gt;CVE-2025-39808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39812&#34;&gt;CVE-2025-39812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39813&#34;&gt;CVE-2025-39813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39817&#34;&gt;CVE-2025-39817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39823&#34;&gt;CVE-2025-39823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39824&#34;&gt;CVE-2025-39824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39828&#34;&gt;CVE-2025-39828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39835&#34;&gt;CVE-2025-39835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39839&#34;&gt;CVE-2025-39839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39841&#34;&gt;CVE-2025-39841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39846&#34;&gt;CVE-2025-39846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39847&#34;&gt;CVE-2025-39847&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39848&#34;&gt;CVE-2025-39848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39853&#34;&gt;CVE-2025-39853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39860&#34;&gt;CVE-2025-39860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39864&#34;&gt;CVE-2025-39864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39865&#34;&gt;CVE-2025-39865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39891&#34;&gt;CVE-2025-39891&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39898&#34;&gt;CVE-2025-39898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39902&#34;&gt;CVE-2025-39902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39920&#34;&gt;CVE-2025-39920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40300&#34;&gt;CVE-2025-40300&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to privilege escalation, denial of service or information
disclosure.&lt;/p&gt;
&lt;p&gt;Starting with this version, modules are signed
with an ephemeral key on all architectures, and the broken pktcdvd
driver is disabled.  This version additionally includes many more bug
fixes from stable updates 6.1.141 through 6.1.153.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1542-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1542-1-libxml2/</link>
      <pubDate>Wed, 15 Oct 2025 19:48:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1542-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1542-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u15 (stretch), 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9714&#34;&gt;CVE-2025-9714&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-9714&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that recursion evaluation in XPath evaluation is
uncontrolled and therefore allows a local attacker to cause a stack
overflow via crafted expressions.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-7425&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Sergei Glazunov discovered a heap-use-after-free in &lt;code&gt;xmlFreeID()&lt;/code&gt;
caused by &lt;code&gt;atype&lt;/code&gt; corruption.  While the vulnerability was reported
against libxslt, the XSLT 1.0 processing library, it is now
mitigated in this libxml2 version.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1541-1 php-horde-css-parser security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1541-1-php-horde-css-parser/</link>
      <pubDate>Wed, 15 Oct 2025 17:27:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1541-1-php-horde-css-parser/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1541-1-php-horde-css-parser/">
      
&lt;p&gt;Package : php-horde-css-parser&lt;/p&gt;


&lt;p&gt;Version : 1.0.11-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13756&#34;&gt;CVE-2020-13756&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data,
possibly leading to remote code execution if the function allSelectors() or
getSelectorsBySpecificity() is called with input from an attacker.&lt;/p&gt;
&lt;p&gt;The php-horde-css-parser package bundles the Saberworm PHP CSS Parser code
and is thus also vulnerable.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1540-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1540-1-qemu/</link>
      <pubDate>Wed, 15 Oct 2025 10:38:47 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1540-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1540-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:3.1&amp;#43;dfsg-8&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3019&#34;&gt;CVE-2023-3019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3447&#34;&gt;CVE-2024-3447&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in QEMU, a fast processor
emulator, that could result in denial of service, information leak, or
privilege escalation.&lt;/p&gt;
&lt;p&gt;CVE-2023-3019&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use-after-free error in the e1000e NIC emulation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-3447&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based buffer overflow in SDHCI device emulation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update also removes the usage of the C (Credential) flag for the
binfmt_misc registration within the qemu-user-static (and qemu-user-binfmt)
packages, as it allowed for privilege escalation when running a suid/sgid binary
under qemu-user.  This means suid/sgid foreign-architecture binaries are not
running with elevated privileges under qemu-user anymore.  If you relied on
this behavior of qemu-user in the past (running suid/sgid foreign-arch
binaries), this will require changes to your deployment.&lt;/p&gt;
&lt;p&gt;In Debian 10 &amp;ldquo;buster&amp;rdquo;, the affected packages are qemu-user-static (and
qemu-user-binfmt).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1539-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1539-1-distro-info-data/</link>
      <pubDate>Tue, 14 Oct 2025 17:31:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1539-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1539-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.41&amp;#43;deb10u2~bpo9&amp;#43;9 (stretch), 0.41&amp;#43;deb10u13 (buster)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian
ELTS users.&lt;/p&gt;
&lt;p&gt;It updates the EoL date for bookworm and adds Ubuntu 26.04 LTS &amp;ldquo;Resolute
Raccoon&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1538-1 libfcgi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1538-1-libfcgi/</link>
      <pubDate>Mon, 13 Oct 2025 19:06:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1538-1-libfcgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1538-1-libfcgi/">
      
&lt;p&gt;Package : libfcgi&lt;/p&gt;


&lt;p&gt;Version : 2.4.0-8.4&amp;#43;deb9u1 (stretch), 2.4.0-10&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23016&#34;&gt;CVE-2025-23016&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libfcgi, a FastCGI bridge from CGI. The issue
is related to an integer overflow (and resultant heap-based buffer
overflow) via crafted nameLen or valueLen values in data to the IPC
socket.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1537-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1537-1-redis/</link>
      <pubDate>Thu, 09 Oct 2025 10:26:31 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1537-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1537-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 3:3.2.6-3&amp;#43;deb9u17 (stretch), 5:5.0.14-1&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46817&#34;&gt;CVE-2025-46817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46819&#34;&gt;CVE-2025-46819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49844&#34;&gt;CVE-2025-49844&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Redis, a popular key/value
database:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-46817: Fix an issue where an authenticated user could have used a
specially-crafted Lua script to cause an integer overflow and potentially
lead to remote code execution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-46819: Address a potential vulnerability where an authenticated
user could have used a specially-crafted Lua script to read out-of-bound data
and/or crash the server and thereby create a denial of service attack.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-49844: Fix an issue where authenticated users could have exploited
a specially-crafted Lua script to manipulate the garbage collector, trigger a
use-after-free and potentially lead to remote code execution.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1536-1 mosquitto security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1536-1-mosquitto/</link>
      <pubDate>Tue, 07 Oct 2025 21:22:17 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1536-1-mosquitto/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1536-1-mosquitto/">
      
&lt;p&gt;Package : mosquitto&lt;/p&gt;


&lt;p&gt;Version : 1.5.7-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10525&#34;&gt;CVE-2024-10525&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2024-10525&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If a malicious broker sends a crafted SUBACK packet with no reason codes, a
client using libmosquitto may make out of bounds memory access when acting in
its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr
clients.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1535-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1535-1-python-django/</link>
      <pubDate>Tue, 07 Oct 2025 14:06:15 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1535-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1535-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u27 (stretch), 1:1.11.29-1&amp;#43;deb10u16 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-59681&#34;&gt;CVE-2025-59681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-59682&#34;&gt;CVE-2025-59682&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two vulnerabilities in Django, a popular web
development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-59681: Fix a potential SQL injection in &lt;code&gt;QuerySet.annotate()&lt;/code&gt;,
&lt;code&gt;alias()&lt;/code&gt;, &lt;code&gt;aggregate()&lt;/code&gt; and &lt;code&gt;extra()&lt;/code&gt;. These methods were subject to SQL
injection in column aliases, using a suitably crafted dictionary via
dictionary expansion as the &lt;code&gt;**kwargs&lt;/code&gt; passed to these methods on MySQL and
MariaDB.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-59682: Fix a potential partial directory-traversal
vulnerability in &lt;code&gt;archive.extract()&lt;/code&gt;. This function, used by
&lt;code&gt;startapp --template&lt;/code&gt; and &lt;code&gt;startproject --template&lt;/code&gt; allowed partial
directory-traversal via an archive with file paths sharing a common prefix
with the target directory.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1534-1 freeipa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1534-1-freeipa/</link>
      <pubDate>Sun, 05 Oct 2025 12:20:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1534-1-freeipa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1534-1-freeipa/">
      
&lt;p&gt;Package : freeipa&lt;/p&gt;


&lt;p&gt;Version : 4.7.2-3&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10195&#34;&gt;CVE-2019-10195&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14867&#34;&gt;CVE-2019-14867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5455&#34;&gt;CVE-2023-5455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3183&#34;&gt;CVE-2024-3183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11029&#34;&gt;CVE-2024-11029&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4404&#34;&gt;CVE-2025-4404&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;FreeIPA, an integrated security information management solution designed for Linux and Unix environments, was affected
by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2019-10195&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FreeIPA&#39;s batch processing API logged operations, including user passwords in clear text on FreeIPA masters.
Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA
but is possible by third-party components. An attacker having access to system logs on FreeIPA masters
could use this flaw to produce log file content with passwords exposed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14867&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in FreeIPA in the way the internal function ber_scanf() was used in some components,
which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal
key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed
on the server hosting the IPA server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-3183&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key.
This key is different for each new session, which protects it from brute force attacks. However,
the ticket it contains is encrypted using the target principal key directly. For user principals,
this key is a hash of a public per-principal randomly-generated salt and the user’s password.
If a principal is compromised it means the attacker would be able to retrieve tickets encrypted
to any principal, all of them being encrypted by their own key directly.
By taking these tickets and salts offline, the attacker could run brute force attacks to
find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-11029&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl.
As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative
user credentials, including the administrator password, to the journal database. In the worst-case scenario,
where the journal log is centralized, users with access to it can have improper access to the FreeIPA administrator credentials.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-4404&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A privilege escalation from host to domain vulnerability was found in the FreeIPA project.
The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin
account by default, allowing users to create services with the same canonical name as the REALM admin.
When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service,
containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over
the REALM, leading to access to sensitive data and sensitive data exfiltration.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1533-1 libcpanel-json-xs-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1533-1-libcpanel-json-xs-perl/</link>
      <pubDate>Wed, 01 Oct 2025 19:45:18 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1533-1-libcpanel-json-xs-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1533-1-libcpanel-json-xs-perl/">
      
&lt;p&gt;Package : libcpanel-json-xs-perl&lt;/p&gt;


&lt;p&gt;Version : 4.09-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40928&#34;&gt;CVE-2025-40928&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been fixed in libcpanel-json-xs-perl, a Perl module for serialising to JSON.&lt;/p&gt;
&lt;p&gt;CVE-2025-40928&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer buffer overflow causing a segfault when parsing crafted JSON,
enabling denial-of-service attacks or other unspecified impact.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1532-1 libjson-xs-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1532-1-libjson-xs-perl/</link>
      <pubDate>Wed, 01 Oct 2025 19:43:27 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1532-1-libjson-xs-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1532-1-libjson-xs-perl/">
      
&lt;p&gt;Package : libjson-xs-perl&lt;/p&gt;


&lt;p&gt;Version : 3.030-1&amp;#43;deb9u1 (stretch), 3.040-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40928&#34;&gt;CVE-2025-40928&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been fixed in libjson-xs-perl, a Perl module which does C/XS-accelerated manipulation of JSON-formatted data.&lt;/p&gt;
&lt;p&gt;CVE-2025-40928&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer buffer overflow causing a segfault when parsing crafted JSON,
enabling denial-of-service attacks or other unspecified impact.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1531-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1531-1-tiff/</link>
      <pubDate>Wed, 01 Oct 2025 10:08:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1531-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1531-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.8-2&amp;#43;deb9u14 (stretch), 4.1.0&amp;#43;git191117-2~deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-13978&#34;&gt;CVE-2024-13978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9900&#34;&gt;CVE-2025-9900&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in tiff, a library and tools
providing support for the Tag Image File Format (TIFF).&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2024-13978&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Affected by this vulnerability is the function t2p_read_tiff_init of
the file tools/tiff2pdf.c of the component fax2ps. The manipulation
leads to null pointer dereference. The attack needs to be approached
locally. The complexity of an attack is rather high. The exploitation
appears to be difficult.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-9900&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;This vulnerability is a &amp;ldquo;write-what-where&amp;rdquo; condition, triggered
when the library processes a specially crafted TIFF image file.
By providing an abnormally large image height value in the file&amp;rsquo;s
metadata, an attacker can trick the library into writing
attacker-controlled color data to an arbitrary memory location.
This memory corruption can be exploited to cause a denial of
service (application crash) or to achieve arbitrary code execution
with the permissions of the user.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1510-2 libcommons-lang-java regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1510-2-libcommons-lang-java/</link>
      <pubDate>Wed, 01 Oct 2025 04:59:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1510-2-libcommons-lang-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1510-2-libcommons-lang-java/">
      
&lt;p&gt;Package : libcommons-lang-java&lt;/p&gt;


&lt;p&gt;Version : 2.6-6&amp;#43;deb9u2 (stretch), 2.6-8&amp;#43;deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;The patch to fix CVE-2025-48924 has not been backported correctly and can lead
to an unexpected ClassNotFoundException in ClassUtils.getClass(). Updated
packages are now available to correct this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1530-1 libcommons-lang3-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1530-1-libcommons-lang3-java/</link>
      <pubDate>Wed, 01 Oct 2025 04:46:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1530-1-libcommons-lang3-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1530-1-libcommons-lang3-java/">
      
&lt;p&gt;Package : libcommons-lang3-java&lt;/p&gt;


&lt;p&gt;Version : 3.5-1&amp;#43;deb9u1 (stretch), 3.8-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48924&#34;&gt;CVE-2025-48924&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in Apache Commons Lang utility classes, a Java
API for classes that are in java.lang&amp;rsquo;s hierarchy.&lt;/p&gt;
&lt;p&gt;CVE-2025-48924&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An uncontrolled recursion vulnerability was discovered in Apache Commons
Lang. The method ClassUtils.getClass() can throw a StackOverflowError
on very long inputs.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1529-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1529-1-modsecurity-apache/</link>
      <pubDate>Tue, 30 Sep 2025 22:58:37 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1529-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1529-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.9.3-3&amp;#43;deb11u5~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54571&#34;&gt;CVE-2025-54571&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Cross-site scripting due to insufficient return value handling has been
fixed in modsecurity-apache, a module for the Apache webserver to
tighten Web application security.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1528-1 wireless-regdb upstream version update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1528-1-wireless-regdb/</link>
      <pubDate>Tue, 30 Sep 2025 18:13:56 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1528-1-wireless-regdb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1528-1-wireless-regdb/">
      
&lt;p&gt;Package : wireless-regdb&lt;/p&gt;


&lt;p&gt;Version : 2025.07.10-1~deb9u1 (stretch), 2025.07.10-1~deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in wireless-regdb 2025.07.10,
reflecting changes to radio regulations in several countries.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1527-1 mplayer security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1527-1-mplayer/</link>
      <pubDate>Sat, 27 Sep 2025 18:11:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1527-1-mplayer/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1527-1-mplayer/">
      
&lt;p&gt;Package : mplayer&lt;/p&gt;


&lt;p&gt;Version : 2:1.3.0-6&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38850&#34;&gt;CVE-2022-38850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38851&#34;&gt;CVE-2022-38851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38855&#34;&gt;CVE-2022-38855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38858&#34;&gt;CVE-2022-38858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38860&#34;&gt;CVE-2022-38860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38861&#34;&gt;CVE-2022-38861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38863&#34;&gt;CVE-2022-38863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38864&#34;&gt;CVE-2022-38864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38865&#34;&gt;CVE-2022-38865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38866&#34;&gt;CVE-2022-38866&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in mplayer, a movie player for Unix-like systems. They are basically related to buffer overflows, divide by zero or out of bounds read in different parts of the code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1526-1 ceph security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1526-1-ceph/</link>
      <pubDate>Sat, 27 Sep 2025 17:26:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1526-1-ceph/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1526-1-ceph/">
      
&lt;p&gt;Package : ceph&lt;/p&gt;


&lt;p&gt;Version : 10.2.11-2&amp;#43;deb9u3 (stretch), 12.2.11&amp;#43;dfsg1-2.1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-52555&#34;&gt;CVE-2025-52555&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Ceph a distributed file system was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;An unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access.&lt;/p&gt;
&lt;p&gt;The result of this is that a user could read, write and execute to any directory as long as they chmod 777 it. This impacts confidentiality, integrity, and availability.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1525-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1525-1-libxslt/</link>
      <pubDate>Thu, 25 Sep 2025 12:21:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1525-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1525-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.29-2.1&amp;#43;deb9u5 (stretch), 1.1.32-2.2~deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40403&#34;&gt;CVE-2023-40403&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-7424&#34;&gt;CVE-2025-7424&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2023-40403&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the &lt;code&gt;generate-id()&lt;/code&gt; function could return
deterministic values and could leak the memory layout of different
XML objects, which might lead to information disclosure.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-7424&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Ivan Fratric discovered a type confusion vulnerability in
&lt;code&gt;xmlNode.psvi&lt;/code&gt; between stylesheet and source nodes, which could
lead to application crash.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1524-1 corosync security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1524-1-corosync/</link>
      <pubDate>Mon, 22 Sep 2025 23:32:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1524-1-corosync/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1524-1-corosync/">
      
&lt;p&gt;Package : corosync&lt;/p&gt;


&lt;p&gt;Version : 2.4.2-3&amp;#43;deb9u2 (stretch), 3.0.1-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30472&#34;&gt;CVE-2025-30472&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in corosync, a cluster engine daemon and
utilities. A stack-based buffer overflow may happen when encryption is
disabled or the attacker knows the encryption key and a large crafted UDP
packet has to be processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1523-1 syslog-ng security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1523-1-syslog-ng/</link>
      <pubDate>Mon, 22 Sep 2025 19:17:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1523-1-syslog-ng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1523-1-syslog-ng/">
      
&lt;p&gt;Package : syslog-ng&lt;/p&gt;


&lt;p&gt;Version : 3.8.1-10&amp;#43;deb9u2 (stretch), 3.19.1-5&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47619&#34;&gt;CVE-2024-47619&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Syslog-ng, a widely used logging service, was found to be vulnerable due to improper handling of wildcard certificates during TLS authentication.&lt;/p&gt;
&lt;p&gt;Specifically, the function tls_wildcard_match() incorrectly accepted certificate patterns like &lt;code&gt;foo.*.bar&lt;/code&gt;,
which violate standard wildcard rules and should not be permitted. Additionally, partial wildcard
patterns such as &lt;code&gt;foo.a*c.bar&lt;/code&gt; were matched by GLib, further weakening the authentication mechanism.&lt;/p&gt;
&lt;p&gt;This flaw could allow a monster-in-the-middle attacker to impersonate legitimate endpoints,
compromising the integrity of secure logging. Such wildcard mismatches must be explicitly rejected to ensure robust TLS validation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1522-1 pam security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1522-1-pam/</link>
      <pubDate>Mon, 22 Sep 2025 19:00:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1522-1-pam/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1522-1-pam/">
      
&lt;p&gt;Package : pam&lt;/p&gt;


&lt;p&gt;Version : 1.1.8-3.6&amp;#43;deb9u1 (stretch), 1.3.1-5&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22365&#34;&gt;CVE-2024-22365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6020&#34;&gt;CVE-2025-6020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in the PAM namespace module,
used to configure private namespaces for user sessions.&lt;/p&gt;
&lt;p&gt;CVE-2024-22365&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Attackers may cause a denial of service
blocking the login process, via mkfifo, because the
openat call (for protect_dir) lacks the O_DIRECTORY flag.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-6020&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;pam_namespace may use access user-controlled paths
without proper protection, allowing local users to elevate
their privileges to root via multiple symlink attacks
and race conditions.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1521-1 shibboleth-sp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1521-1-shibboleth-sp/</link>
      <pubDate>Sun, 21 Sep 2025 22:24:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1521-1-shibboleth-sp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1521-1-shibboleth-sp/">
      
&lt;p&gt;Package : shibboleth-sp&lt;/p&gt;


&lt;p&gt;Version : 3.0.4&amp;#43;dfsg1-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-9943&#34;&gt;CVE-2025-9943&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An SQL injection vulnerability has been identified in the &amp;ldquo;ID&amp;rdquo; attribute of the
SAML response when the replay cache of the Shibboleth Service Provider (SP)
is configured to use an SQL database as storage service.&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker can exploit this issue via blind SQL injection,
allowing for the extraction of arbitrary data from the database,
if the database connection is configured to use the ODBC plugin.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1520-1 jq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1520-1-jq/</link>
      <pubDate>Sun, 21 Sep 2025 17:36:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1520-1-jq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1520-1-jq/">
      
&lt;p&gt;Package : jq&lt;/p&gt;


&lt;p&gt;Version : 1.5&amp;#43;dfsg-1.3&amp;#43;deb9u1 (stretch), 1.5&amp;#43;dfsg-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48060&#34;&gt;CVE-2025-48060&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in jq, a lightweight and flexible command-line JSON processor.
A heap buffer overflow may happen when formatting empty strings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1519-1 openvpn security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1519-1-openvpn/</link>
      <pubDate>Sat, 20 Sep 2025 14:29:16 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1519-1-openvpn/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1519-1-openvpn/">
      
&lt;p&gt;Package : openvpn&lt;/p&gt;


&lt;p&gt;Version : 2.4.0-6&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5594&#34;&gt;CVE-2024-5594&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in openvpn, a virtual private
network application which could result in data injection.&lt;/p&gt;
&lt;p&gt;CVE-2024-5594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OpenVPN does not sanitize PUSH_REPLY messages properly which
attackers can use to inject unexpected arbitrary data into
third-party executables or plug-ins.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1518-1 openvpn security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1518-1-openvpn/</link>
      <pubDate>Sat, 20 Sep 2025 14:27:50 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1518-1-openvpn/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1518-1-openvpn/">
      
&lt;p&gt;Package : openvpn&lt;/p&gt;


&lt;p&gt;Version : 2.4.7-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0547&#34;&gt;CVE-2022-0547&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5594&#34;&gt;CVE-2024-5594&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in openvpn, a virtual private
network application which could result in authentication bypass or
data injection.&lt;/p&gt;
&lt;p&gt;CVE-2022-0547&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OpenVPN may enable authentication bypass in external
authentication plug-ins when more than one of them makes use of
deferred authentication replies, which allows an external user to
be granted access with only partially correct credentials.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-5594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OpenVPN does not sanitize PUSH_REPLY messages properly which
attackers can use to inject unexpected arbitrary data into
third-party executables or plug-ins.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1517-1 python-eventlet security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1517-1-python-eventlet/</link>
      <pubDate>Thu, 18 Sep 2025 11:52:57 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1517-1-python-eventlet/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1517-1-python-eventlet/">
      
&lt;p&gt;Package : python-eventlet&lt;/p&gt;


&lt;p&gt;Version : 0.19.0-6&amp;#43;deb9u1 (stretch), 0.20.0-6&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-58068&#34;&gt;CVE-2025-58068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40217&#34;&gt;CVE-2023-40217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential HTTP Request Smuggling issue was discovered in &lt;code&gt;python-eventlet&lt;/code&gt;, a
concurrent networking library for Python.&lt;/p&gt;
&lt;p&gt;This issue was caused by the improper handling of HTTP trailer sections. This
vulnerability could have permitted attackers to bypass front-end security
controls, launch targeted attacks against active site users and/or poison web
caches. This problem has been addressed by dropping trailers, a potentially
breaking change if a backend behind the &lt;code&gt;eventlet.wsgi&lt;/code&gt; proxy requires such
trailers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1516-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1516-1-imagemagick/</link>
      <pubDate>Sun, 14 Sep 2025 20:01:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1516-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1516-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u22 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11531&#34;&gt;CVE-2017-11531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11532&#34;&gt;CVE-2017-11532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11534&#34;&gt;CVE-2017-11534&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53014&#34;&gt;CVE-2025-53014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53019&#34;&gt;CVE-2025-53019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53101&#34;&gt;CVE-2025-53101&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55154&#34;&gt;CVE-2025-55154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55212&#34;&gt;CVE-2025-55212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55298&#34;&gt;CVE-2025-55298&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-57803&#34;&gt;CVE-2025-57803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-57807&#34;&gt;CVE-2025-57807&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in imagemagick an image manipulation
software suite.&lt;/p&gt;
&lt;p&gt;CVE-2017-11531&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted file in convert, can lead to a Memory Leak in the WriteHISTOGRAMImage()
function in coders/histogram.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-11532&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted file in convert, can lead to a Memory Leak in the WriteMPCImage()
function in coders/mpc.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-11534&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted file in convert, can lead to a Memory Leak in the lite_font_map()
function in coders/wmf.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53014&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow was found in the `InterpretImageFilename`
function. The issue stems from an off-by-one error that causes
out-of-bounds memory access when processing format strings
containing consecutive percent signs (`%%`).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53019&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ImageMagick&#39;s `magick stream` command, specifying multiple
consecutive `%d` format specifiers in a filename template
caused a memory leak
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53101&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ImageMagick&#39;s `magick mogrify` command, specifying
multiple consecutive `%d` format specifiers in a filename
template caused internal pointer arithmetic to generate
an address below the beginning of the stack buffer,
resulting in a stack overflow through `vsnprintf()`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-55154&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The magnified size calculations in ReadOneMNGIMage
(in coders/png.c) are unsafe and can overflow,
leading to memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-55212&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;passing a geometry string containing only a colon (&amp;quot;:&amp;quot;)
to montage -geometry leads GetGeometry() to set width/height
to 0. Later, ThumbnailImage() divides by these zero dimensions,
triggering a crash (SIGFPE/abort)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-55298&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A format string bug vulnerability exists in InterpretImageFilename
function where user input is directly passed to FormatLocaleString
without proper sanitization. An attacker can overwrite arbitrary
memory regions, enabling a wide range of attacks from heap
overflow to remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-57803&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A 32-bit integer overflow in the BMP encoderâ??s scanline-stride
computation collapses bytes_per_line (stride) to a tiny
value while the per-row writer still emits 3 Ã? width bytes
for 24-bpp images. The row base pointer advances using the
(overflowed) stride, so the first row immediately writes
past its slot and into adjacent heap memory with
attacker-controlled bytes.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-57807&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A security problem was found in SeekBlob(), which permits
advancing the stream offset beyond the current end without
increasing capacity, and WriteBlob(), which then expands by
quantum + length (amortized) instead of offset + length,
and copies to data + offset. When offset â?« extent, the
copy targets memory beyond the allocation, producing a
deterministic heap write on 64-bit builds. No 2â?¶â?´
arithmetic wrap, external delegates, or policy settings
are required.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1515-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1515-1-imagemagick/</link>
      <pubDate>Sat, 13 Sep 2025 21:05:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1515-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1515-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53014&#34;&gt;CVE-2025-53014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53019&#34;&gt;CVE-2025-53019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53101&#34;&gt;CVE-2025-53101&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55154&#34;&gt;CVE-2025-55154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55212&#34;&gt;CVE-2025-55212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-55298&#34;&gt;CVE-2025-55298&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-57803&#34;&gt;CVE-2025-57803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-57807&#34;&gt;CVE-2025-57807&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in imagemagick an image manipulation
software suite.&lt;/p&gt;
&lt;p&gt;CVE-2025-53014&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow was found in the `InterpretImageFilename`
function. The issue stems from an off-by-one error that causes
out-of-bounds memory access when processing format strings
containing consecutive percent signs (`%%`).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53019&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ImageMagick&#39;s `magick stream` command, specifying multiple
consecutive `%d` format specifiers in a filename template
caused a memory leak
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53101&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ImageMagick&#39;s `magick mogrify` command, specifying
multiple consecutive `%d` format specifiers in a filename
template caused internal pointer arithmetic to generate
an address below the beginning of the stack buffer,
resulting in a stack overflow through `vsnprintf()`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-55154&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The magnified size calculations in ReadOneMNGIMage
(in coders/png.c) are unsafe and can overflow,
leading to memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-55212&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;passing a geometry string containing only a colon (&amp;quot;:&amp;quot;)
to montage -geometry leads GetGeometry() to set width/height
to 0. Later, ThumbnailImage() divides by these zero dimensions,
triggering a crash (SIGFPE/abort)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-55298&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A format string bug vulnerability exists in InterpretImageFilename
function where user input is directly passed to FormatLocaleString
without proper sanitization. An attacker can overwrite arbitrary
memory regions, enabling a wide range of attacks from heap
overflow to remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-57803&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A 32-bit integer overflow in the BMP encoderâ??s scanline-stride
computation collapses bytes_per_line (stride) to a tiny
value while the per-row writer still emits 3 Ã? width bytes
for 24-bpp images. The row base pointer advances using the
(overflowed) stride, so the first row immediately writes
past its slot and into adjacent heap memory with
attacker-controlled bytes.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-57807&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A security problem was found in SeekBlob(), which permits
advancing the stream offset beyond the current end without
increasing capacity, and WriteBlob(), which then expands by
quantum + length (amortized) instead of offset + length,
and copies to data + offset. When offset â?« extent, the
copy targets memory beyond the allocation, producing a
deterministic heap write on 64-bit builds. No 2â?¶â?´
arithmetic wrap, external delegates, or policy settings
are required.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1514-1 ca-certificates-java bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1514-1-ca-certificates-java/</link>
      <pubDate>Sat, 13 Sep 2025 18:56:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1514-1-ca-certificates-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1514-1-ca-certificates-java/">
      
&lt;p&gt;Package : ca-certificates-java&lt;/p&gt;


&lt;p&gt;Version : 20230710~deb12u1~deb11u1~deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;The ca-certificates-java package needs to be upgraded to resolve a circular
dependency between Java packages and ca-certificates,
which would otherwise prevent the system certificates from being updated.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1513-1 opencv security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1513-1-opencv/</link>
      <pubDate>Fri, 12 Sep 2025 14:25:55 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1513-1-opencv/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1513-1-opencv/">
      
&lt;p&gt;Package : opencv&lt;/p&gt;


&lt;p&gt;Version : 3.2.0&amp;#43;dfsg-6&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18009&#34;&gt;CVE-2017-18009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14491&#34;&gt;CVE-2019-14491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14492&#34;&gt;CVE-2019-14492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14493&#34;&gt;CVE-2019-14493&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15939&#34;&gt;CVE-2019-15939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19624&#34;&gt;CVE-2019-19624&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in the computer vision library OpenCV.&lt;/p&gt;
&lt;p&gt;CVE-2017-18009&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in the cv::HdrDecoder::checkSignature function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14491&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read in cv::predictOrdered&amp;lt;cv::HaarEvaluator&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14492&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read/write in the HaarEvaluator::OptFeature::calc function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14493&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference in the cv::XMLParser::parse funcion
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15939&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Divide-by-zero error in cv::HOGDescriptor::getDescriptorSize 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19624&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read in the calc() function of dis_flow.cpp, when dealing
with small images
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1512-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1512-1-cups/</link>
      <pubDate>Thu, 11 Sep 2025 23:53:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1512-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1512-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 2.2.1-8&amp;#43;deb9u13 (stretch), 2.2.10-6&amp;#43;deb10u12 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-58060&#34;&gt;CVE-2025-58060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-58364&#34;&gt;CVE-2025-58364&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in cups, the Common UNIX Printing
System, which may result in authentication bypass with AuthType
Negotiate or in denial of service (daemon crash).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1511-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1511-1-clamav/</link>
      <pubDate>Thu, 04 Sep 2025 15:05:45 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1511-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1511-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 1.0.9&amp;#43;dfsg-1~deb9u1 (stretch), 1.0.9&amp;#43;dfsg-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20128&#34;&gt;CVE-2025-20128&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20260&#34;&gt;CVE-2025-20260&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A couple of vulnerabilities have been fixed in ClamAV, an anti-virus utility
for Unix, in this new upstream stable release.&lt;/p&gt;
&lt;p&gt;CVE-2025-20128&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV
could allow an unauthenticated, remote attacker to cause a denial of service
(DoS) condition on an affected device.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-20260&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The PDF scanning processes of ClamAV could allow an unauthenticated, remote
attacker to cause a buffer overflow condition, cause a denial of service (DoS)
condition, or execute arbitrary code on an affected device.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1510-1 libcommons-lang-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1510-1-libcommons-lang-java/</link>
      <pubDate>Sun, 31 Aug 2025 18:29:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1510-1-libcommons-lang-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1510-1-libcommons-lang-java/">
      
&lt;p&gt;Package : libcommons-lang-java&lt;/p&gt;


&lt;p&gt;Version : 2.6-6&amp;#43;deb9u1 (stretch), 2.6-8&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48924&#34;&gt;CVE-2025-48924&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in Apache Commons Lang utility classes, a Java
API for classes that are in java.lang&amp;rsquo;s hierarchy.&lt;/p&gt;
&lt;p&gt;CVE-2025-48924&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An uncontrolled recursion vulnerability was discovered in Apache Commons
Lang. The method ClassUtils.getClass() can throw a StackOverflowError
on very long inputs.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1509-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1509-1-apache2/</link>
      <pubDate>Sat, 30 Aug 2025 23:15:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1509-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1509-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.25-3&amp;#43;deb9u21 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38709&#34;&gt;CVE-2023-38709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42516&#34;&gt;CVE-2024-42516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43204&#34;&gt;CVE-2024-43204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47252&#34;&gt;CVE-2024-47252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23048&#34;&gt;CVE-2025-23048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49630&#34;&gt;CVE-2025-49630&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49812&#34;&gt;CVE-2025-49812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53020&#34;&gt;CVE-2025-53020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been addressed in Apache,
a widely used web server.&lt;/p&gt;
&lt;p&gt;Please note that the fix for CVE-2025-23048, included in this ELA,
may cause some SSL-enabled websites to encounter the error AH02032.
Additional details are provided at the end of this advisory.&lt;/p&gt;
&lt;p&gt;CVE-2024-42516&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTTP response splitting in the core of Apache HTTP Server allows an
attacker who can manipulate the Content-Type response headers of
applications hosted or proxied by the server can split the HTTP response
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A SSRF (Server Side Request Forgery) was found in Apache HTTP Server
with mod_proxy loaded allows an attacker to
send outbound proxy requests to a URL controlled by the attacker.
This attack requires an unlikely configuration where mod_headers
is configured to modify the Content-Type request or response header with a
value provided in the HTTP request
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43394&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows
allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite
or apache expressions that pass unvalidated request input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47252&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient escaping of user-supplied data in mod_ssl allows an untrusted
SSL/TLS client to insert escape characters into log files in some
configurations. In a logging configuration where CustomLog is used with
&amp;quot;%{varname}x&amp;quot; or &amp;quot;%{varname}c&amp;quot; to log variables provided by mod_ssl such as
SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and
unsanitized data provided by the client may appear in log files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-23048&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An access control bypass by trusted clients is possible using TLS 1.3
session resumption. Configurations are affected when mod_ssl is
configured for multiple virtual hosts, with each restricted to a
different set of trusted client certificates
(for example with a different SSLCACertificateFile/Path setting).
In such a case, a client trusted to access one virtual host may be able to
access another virtual host, if SSLStrictSNIVHostCheck is not enabled
in either virtual host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-49630&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In certain proxy configurations, a denial of service attack against
Apache HTTP Server can be triggered by untrusted clients causing
an assertion in mod_proxy_http2. Configurations affected are a
reverse proxy is configured for an HTTP/2 backend, with
ProxyPreserveHost set to &amp;quot;on&amp;quot;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-49812&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In some mod_ssl configurations on Apache HTTP server, an HTTP
desynchronisation attack allows a man-in-the-middle attacker
to hijack an HTTP session via a TLS upgrade. Only configurations
using &amp;quot;SSLEngine optional&amp;quot; to enable TLS upgrades are affected.
Support for TLS upgrade was removed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53020&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A late Release of Memory after Effective Lifetime vulnerability
was found in Apache HTTP Server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that following the resolution of CVE-2025-23048,
some SSL-enabled websites may begin encountering
the error (AH02032):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Misdirected Request:
The client needs a new connection for this request as the
requested host name does not match the Server Name Indication
(SNI) in use for this connection.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This behavior is particularly noticeable with AWS Application
Load Balancers. Although they support intelligent SNI handling,
they do not (as of this writing) relay SNI data to the target
server, resulting in failed connections when hostnames don’t align.&lt;/p&gt;
&lt;p&gt;Without an SNI provided by the client, there is nothing httpd
can do to determine which vhost/configuration should be
used to provide the correct certificate (and TLS authentication
eventually) whenever multiple vhosts listen on the same IP:port.&lt;/p&gt;
&lt;p&gt;That&amp;rsquo;s because reading the HTTP Host header necessarily has to
happen after the TLS handshake/auth/decryption (and later
renegotiation is not an option with TLSv1.3).&lt;/p&gt;
&lt;p&gt;So those connections fall back to the first vhost declared on
the IP:port for the TLS handshake part, and if the request
Host header finally matches a different vhost with a different
TLS configuration it&amp;rsquo;s rejected with AH02032.&lt;/p&gt;
&lt;p&gt;Before 2.4.64 (or this backport) the check was not accurate
and would allow that, with security implications.&lt;/p&gt;
&lt;p&gt;As a workaround, you may (after a risk analysis) generate a
wildcard certificate. If you’re managing multiple domains,
consolidate them into a single certificate by including each
wildcard domain as an alias. Then, update the Apache configuration
to reference this unified certificate.&lt;/p&gt;
&lt;p&gt;Another possible workaround is to configure each virtual host to
listen on a separate port. This approach avoids SNI-related issues
by ensuring that each vhost is uniquely addressed through its own
connection endpoint, thereby allowing distinct TLS configurations
without ambiguity.&lt;/p&gt;
&lt;p&gt;This error may also stem from a misconfigured HAProxy setup.
In such cases, enabling dynamic SNI handling on HAProxy might be
necessary to ensure that the correct hostname is passed through
during the TLS handshake. After risk analysis, it could be done
by using &amp;ldquo;sni req.hdr(Host)&amp;rdquo; directive.&lt;/p&gt;
&lt;p&gt;This error may also be caused by a misconfigured Nginx proxy setup.
In such scenarios, enabling Server Name Indication (SNI) when connecting
to the backend may be necessary to ensure that the correct hostname is
transmitted during the TLS handshake. After conducting a risk analysis,
this can be achieved by configuring the &amp;ldquo;proxy_ssl_server_name on;&amp;rdquo;
and &amp;ldquo;proxy_ssl_name $host;&amp;rdquo; directives.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1508-1 udisks2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1508-1-udisks2/</link>
      <pubDate>Fri, 29 Aug 2025 15:57:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1508-1-udisks2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1508-1-udisks2/">
      
&lt;p&gt;Package : udisks2&lt;/p&gt;


&lt;p&gt;Version : 2.1.8-1&amp;#43;deb9u2 (stretch), 2.8.1-4&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-8067&#34;&gt;CVE-2025-8067&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Michael Imfeld discovered an out-of-bounds read vulnerability in udisks2,
which may result in denial of service (daemon process crash), or in
mapping an internal file descriptor from the daemon process onto a loop
device, resulting in local privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1507-1 luajit security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1507-1-luajit/</link>
      <pubDate>Tue, 26 Aug 2025 00:06:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1507-1-luajit/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1507-1-luajit/">
      
&lt;p&gt;Package : luajit&lt;/p&gt;


&lt;p&gt;Version : 2.1.0~beta3&amp;#43;dfsg-5.1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19391&#34;&gt;CVE-2019-19391&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15890&#34;&gt;CVE-2020-15890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24372&#34;&gt;CVE-2020-24372&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25176&#34;&gt;CVE-2024-25176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25177&#34;&gt;CVE-2024-25177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25178&#34;&gt;CVE-2024-25178&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2019-19391&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that &lt;code&gt;debug.getinfo()&lt;/code&gt; has a type confusion issue
that leads to arbitrary memory write or read operations, because
certain cases involving valid stack levels and &lt;code&gt;&amp;gt;&lt;/code&gt; options are
mishandled.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note&lt;/em&gt;: The LuaJIT project owner disputes the vulnerability and states
that the debug library is unsafe by design.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2020-15890&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Yongheng Chen discovered an out-of-bounds read because &lt;code&gt;__gc&lt;/code&gt;
handler frame traversal is mishandled.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2020-24372&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Yongheng Chen discovered out-of-bounds read in &lt;code&gt;lj_err_run()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-25176&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Kutyavin Maxim discovered a stack-buffer-overflow in
&lt;code&gt;lj_strfmt_wfnum()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-25177&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Kutyavin Maxim discovered an unsinking of &lt;code&gt;IR_FSTORE&lt;/code&gt; for &lt;code&gt;NULL&lt;/code&gt;
metatable.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-25178&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Kutyavin Maxim discovered an out-of-bounds read in the
stack-overflow handler.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1506-1 firebird3.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1506-1-firebird3.0/</link>
      <pubDate>Mon, 25 Aug 2025 15:34:46 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1506-1-firebird3.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1506-1-firebird3.0/">
      
&lt;p&gt;Package : firebird3.0&lt;/p&gt;


&lt;p&gt;Version : 3.0.5.33100.ds4-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54989&#34;&gt;CVE-2025-54989&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An XDR message parsing NULL pointer dereference has been fixed in the Firebird database.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1505-1 iperf3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1505-1-iperf3/</link>
      <pubDate>Sun, 24 Aug 2025 23:53:45 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1505-1-iperf3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1505-1-iperf3/">
      
&lt;p&gt;Package : iperf3&lt;/p&gt;


&lt;p&gt;Version : 3.9-1&amp;#43;deb11u3~deb9u1 (stretch), 3.9-1&amp;#43;deb11u3~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54349&#34;&gt;CVE-2025-54349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54350&#34;&gt;CVE-2025-54350&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been fixed in the IP bandwidth measuring tool iperf3.&lt;/p&gt;
&lt;p&gt;CVE-2025-54349&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;heap buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-54350&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;reachable assert
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1504-1 unbound1.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1504-1-unbound1.9/</link>
      <pubDate>Sun, 24 Aug 2025 22:51:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1504-1-unbound1.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1504-1-unbound1.9/">
      
&lt;p&gt;Package : unbound1.9&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u2~deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18934&#34;&gt;CVE-2019-18934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33655&#34;&gt;CVE-2024-33655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5994&#34;&gt;CVE-2025-5994&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-5994&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Resolvers supporting ECS need to segregate outgoing queries to
accommodate for different outgoing ECS information.  This re-opens
up resolvers to a birthday paradox attack (Rebirthday Attack) that
tries to match the DNS transaction ID in order to cache non-ECS
poisonous replies.&lt;/p&gt;
&lt;p&gt;Unbound now includes a fix that disregards replies that came back
without ECS when ECS was expected.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-33655&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;The DNSBomb attack, via specially timed DNS queries and answers, can
cause a Denial of Service on resolvers and spoofed targets.&lt;/p&gt;
&lt;p&gt;While Unbound itself is &lt;em&gt;not&lt;/em&gt; vulnerable for DoS, it can be used to
take part in a pulsing DoS amplification attack.&lt;/p&gt;
&lt;p&gt;Configuration options have been added to help mitigate the impact by
trying to shrink the DNSBomb window so that the impact of the DoS
from Unbound is significantly lower than it used to be:&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;discard-timeout&lt;/code&gt; (default value: 1900)&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;After 1900 ms a reply to the client will be dropped.  Unbound
would still work on the query but refrain from replying in order
to not accumulate a huge number of &amp;ldquo;old&amp;rdquo; replies.  Legitimate
clients retry on timeouts.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;wait-limit&lt;/code&gt; (default value: 1000)&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Limits the amount of client queries that require recursion
(cache-hits are not counted) per IP address.  More recursive
queries than the allowed limit are dropped.
Use &lt;code&gt;`wait-limit: 0`&lt;/code&gt; in order to disable all wait limits.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;wait-limit-netblock&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;These do not have a default value but they can fine grain
configuration for specific netblocks.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-18934&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Shell code injection vulnerability after receiving a specially
crafted answer.  This issue can &lt;em&gt;only&lt;/em&gt; be triggered if unbound was
compiled with &lt;code&gt;--enable-ipsecmod&lt;/code&gt; support, and ipsecmod is enabled
and used in the configuration.&lt;/p&gt;
&lt;p&gt;Debian binary packages are &lt;em&gt;not&lt;/em&gt; built with &lt;code&gt;--enable-ipsecmod&lt;/code&gt;, and
therefore unaffected.  Still, the fix is included in the source
package for users building their own packages.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;In addition, this version includes follow-up upstream fixes and
improvements for CVE-2024-43167.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1503-1 unbound security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1503-1-unbound/</link>
      <pubDate>Sun, 24 Aug 2025 22:50:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1503-1-unbound/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1503-1-unbound/">
      
&lt;p&gt;Package : unbound&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18934&#34;&gt;CVE-2019-18934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25031&#34;&gt;CVE-2019-25031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25032&#34;&gt;CVE-2019-25032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25033&#34;&gt;CVE-2019-25033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25034&#34;&gt;CVE-2019-25034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25035&#34;&gt;CVE-2019-25035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25036&#34;&gt;CVE-2019-25036&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25037&#34;&gt;CVE-2019-25037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25038&#34;&gt;CVE-2019-25038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25039&#34;&gt;CVE-2019-25039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25040&#34;&gt;CVE-2019-25040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25041&#34;&gt;CVE-2019-25041&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25042&#34;&gt;CVE-2019-25042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33655&#34;&gt;CVE-2024-33655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5994&#34;&gt;CVE-2025-5994&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-5994&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Resolvers supporting ECS need to segregate outgoing queries to
accommodate for different outgoing ECS information.  This re-opens
up resolvers to a birthday paradox attack (Rebirthday Attack) that
tries to match the DNS transaction ID in order to cache non-ECS
poisonous replies.&lt;/p&gt;
&lt;p&gt;Unbound now includes a fix that disregards replies that came back
without ECS when ECS was expected.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-33655&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;The DNSBomb attack, via specially timed DNS queries and answers, can
cause a Denial of Service on resolvers and spoofed targets.&lt;/p&gt;
&lt;p&gt;While Unbound itself is &lt;em&gt;not&lt;/em&gt; vulnerable for DoS, it can be used to
take part in a pulsing DoS amplification attack.&lt;/p&gt;
&lt;p&gt;Configuration options have been added to help mitigate the impact by
trying to shrink the DNSBomb window so that the impact of the DoS
from Unbound is significantly lower than it used to be:&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;code&gt;discard-timeout&lt;/code&gt; (default value: 1900)&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;After 1900 ms a reply to the client will be dropped.  Unbound
would still work on the query but refrain from replying in order
to not accumulate a huge number of &amp;ldquo;old&amp;rdquo; replies.  Legitimate
clients retry on timeouts.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;wait-limit&lt;/code&gt; (default value: 1000)&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Limits the amount of client queries that require recursion
(cache-hits are not counted) per IP address.  More recursive
queries than the allowed limit are dropped.
Use &lt;code&gt;`wait-limit: 0`&lt;/code&gt; in order to disable all wait limits.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;&lt;code&gt;wait-limit-netblock&lt;/code&gt;&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;These do not have a default value but they can fine grain
configuration for specific netblocks.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25031&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Configuration injection in &lt;code&gt;create_unbound_ad_servers.sh&lt;/code&gt; upon a
successful man-in-the-middle attack against a cleartext HTTP
session.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25032&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer overflow in the regional allocator via &lt;code&gt;regional_alloc&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25033&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer overflow in the regional allocator via the &lt;code&gt;ALIGN_UP&lt;/code&gt; macro.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25034&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer overflow in &lt;code&gt;sldns_str2wire_dname_buf_origin()&lt;/code&gt; leading to
an out-of-bounds write.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25035&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Out-of-bounds write in &lt;code&gt;sldns_bget_token_par()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25036&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Assertion failure and denial of service in &lt;code&gt;synth_cname()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25037&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Assertion failure and denial of service in &lt;code&gt;dname_pkt_copy()&lt;/code&gt; via an
invalid packet.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25038&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer overflow in a size calculation in dnscrypt/dnscrypt.c.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25039&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Integer overflow in a size calculation in respip/respip.c.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25040&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Infinite loop via a compressed name in &lt;code&gt;dname_pkt_copy()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25041&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Assertion failure via a compressed name in &lt;code&gt;dname_pkt_copy()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-25042&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Out-of-bounds write via a compressed name in &lt;code&gt;rdata_copy()&lt;/code&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-18934&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Shell code injection vulnerability after receiving a specially
crafted answer.  This issue can &lt;em&gt;only&lt;/em&gt; be triggered if unbound was
compiled with &lt;code&gt;--enable-ipsecmod&lt;/code&gt; support, and ipsecmod is enabled
and used in the configuration.&lt;/p&gt;
&lt;p&gt;Debian binary packages are &lt;em&gt;not&lt;/em&gt; built with &lt;code&gt;--enable-ipsecmod&lt;/code&gt;, and
therefore unaffected.  Still, the fix is included in the source
package for users building their own packages.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;In addition, this version includes follow-up upstream fixes and
improvements for CVE-2024-43167.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1502-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1502-1-apache2/</link>
      <pubDate>Fri, 22 Aug 2025 00:29:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1502-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1502-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.59-1~deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42516&#34;&gt;CVE-2024-42516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43204&#34;&gt;CVE-2024-43204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47252&#34;&gt;CVE-2024-47252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23048&#34;&gt;CVE-2025-23048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49630&#34;&gt;CVE-2025-49630&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49812&#34;&gt;CVE-2025-49812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53020&#34;&gt;CVE-2025-53020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been addressed in Apache,
a widely used web server.&lt;/p&gt;
&lt;p&gt;Please note that the fix for CVE-2025-23048, included in this ELA,
may cause some SSL-enabled websites to encounter the error AH02032.
Additional details are provided at the end of this advisory.&lt;/p&gt;
&lt;p&gt;CVE-2024-42516&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTTP response splitting in the core of Apache HTTP Server allows an
attacker who can manipulate the Content-Type response headers of
applications hosted or proxied by the server can split the HTTP response
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A SSRF (Server Side Request Forgery) was found in Apache HTTP Server
with mod_proxy loaded allows an attacker to
send outbound proxy requests to a URL controlled by the attacker.
This attack requires an unlikely configuration where mod_headers
is configured to modify the Content-Type request or response header with a
value provided in the HTTP request
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43394&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows
allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite
or apache expressions that pass unvalidated request input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47252&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient escaping of user-supplied data in mod_ssl allows an untrusted
SSL/TLS client to insert escape characters into log files in some
configurations. In a logging configuration where CustomLog is used with
&amp;quot;%{varname}x&amp;quot; or &amp;quot;%{varname}c&amp;quot; to log variables provided by mod_ssl such as
SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and
unsanitized data provided by the client may appear in log files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-23048&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An access control bypass by trusted clients is possible using TLS 1.3
session resumption. Configurations are affected when mod_ssl is
configured for multiple virtual hosts, with each restricted to a
different set of trusted client certificates
(for example with a different SSLCACertificateFile/Path setting).
In such a case, a client trusted to access one virtual host may be able to
access another virtual host, if SSLStrictSNIVHostCheck is not enabled
in either virtual host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-49630&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In certain proxy configurations, a denial of service attack against
Apache HTTP Server can be triggered by untrusted clients causing
an assertion in mod_proxy_http2. Configurations affected are a
reverse proxy is configured for an HTTP/2 backend, with
ProxyPreserveHost set to &amp;quot;on&amp;quot;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-49812&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In some mod_ssl configurations on Apache HTTP server, an HTTP
desynchronisation attack allows a man-in-the-middle attacker
to hijack an HTTP session via a TLS upgrade. Only configurations
using &amp;quot;SSLEngine optional&amp;quot; to enable TLS upgrades are affected.
Support for TLS upgrade was removed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53020&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A late Release of Memory after Effective Lifetime vulnerability
was found in Apache HTTP Server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that following the resolution of CVE-2025-23048,
some SSL-enabled websites may begin encountering
the error (AH02032):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Misdirected Request:
The client needs a new connection for this request as the
requested host name does not match the Server Name Indication
(SNI) in use for this connection.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This behavior is particularly noticeable with AWS Application
Load Balancers. Although they support intelligent SNI handling,
they do not (as of this writing) relay SNI data to the target
server, resulting in failed connections when hostnames don’t align.&lt;/p&gt;
&lt;p&gt;Without an SNI provided by the client, there is nothing httpd
can do to determine which vhost/configuration should be
used to provide the correct certificate (and TLS authentication
eventually) whenever multiple vhosts listen on the same IP:port.&lt;/p&gt;
&lt;p&gt;That&amp;rsquo;s because reading the HTTP Host header necessarily has to
happen after the TLS handshake/auth/decryption (and later
renegotiation is not an option with TLSv1.3).&lt;/p&gt;
&lt;p&gt;So those connections fall back to the first vhost declared on
the IP:port for the TLS handshake part, and if the request
Host header finally matches a different vhost with a different
TLS configuration it&amp;rsquo;s rejected with AH02032.&lt;/p&gt;
&lt;p&gt;Before 2.4.64 (or this backport) the check was not accurate
and would allow that, with security implications.&lt;/p&gt;
&lt;p&gt;As a workaround, you may (after a risk analysis) generate a
wildcard certificate. If you’re managing multiple domains,
consolidate them into a single certificate by including each
wildcard domain as an alias. Then, update the Apache configuration
to reference this unified certificate.&lt;/p&gt;
&lt;p&gt;Another possible workaround is to configure each virtual host to
listen on a separate port. This approach avoids SNI-related issues
by ensuring that each vhost is uniquely addressed through its own
connection endpoint, thereby allowing distinct TLS configurations
without ambiguity.&lt;/p&gt;
&lt;p&gt;This error may also stem from a misconfigured HAProxy setup.
In such cases, enabling dynamic SNI handling on HAProxy might be
necessary to ensure that the correct hostname is passed through
during the TLS handshake. After risk analysis, it could be done
by using &amp;ldquo;sni req.hdr(Host)&amp;rdquo; directive.&lt;/p&gt;
&lt;p&gt;This error may also be caused by a misconfigured Nginx proxy setup.
In such scenarios, enabling Server Name Indication (SNI) when connecting
to the backend may be necessary to ensure that the correct hostname is
transmitted during the TLS handshake. After conducting a risk analysis,
this can be achieved by configuring the &amp;ldquo;proxy_ssl_server_name on;&amp;rdquo;
and &amp;ldquo;proxy_ssl_name $host;&amp;rdquo; directives.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1501-1 mariadb-10.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1501-1-mariadb-10.3/</link>
      <pubDate>Sat, 16 Aug 2025 11:15:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1501-1-mariadb-10.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1501-1-mariadb-10.3/">
      
&lt;p&gt;Package : mariadb-10.3&lt;/p&gt;


&lt;p&gt;Version : 1:10.3.39-0&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52968&#34;&gt;CVE-2023-52968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52969&#34;&gt;CVE-2023-52969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52970&#34;&gt;CVE-2023-52970&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in MariaDB 10.3, a popular database engine.&lt;/p&gt;
&lt;p&gt;CVE-2023-52968&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Denial Of Service (DoS) was found in MariaDB. MariaDB server may call
fix_fields_if_needed under mysql_derived_prepare when derived is not yet
prepared, leading to a find_field_in_table crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-52969&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MariaDB may crash with an empty backtrace log. This may be related
to make_aggr_tables_info and optimize_stage2.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-52968&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MariaDB may crash in Item_direct_view_ref::derived_field_transformer_for_where.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1500-1 dns-root-data DNSSEC trust anchors update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1500-1-dns-root-data/</link>
      <pubDate>Fri, 15 Aug 2025 09:53:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1500-1-dns-root-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1500-1-dns-root-data/">
      
&lt;p&gt;Package : dns-root-data&lt;/p&gt;


&lt;p&gt;Version : 2024071801~deb9u1 (stretch), 2024071801~deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;The dns-root-data package contains DNS root zone data as published by
IANA to be used as initial source by DNS software. This release adds
the DNSKEY record for the KSK-2024 trust anchor. This new key is
planned for use starting October 2026, and the previous one (KSK-2017)
should be revoked January 2027, leaving time to propagate the new
trust anchor, or roll to it sooner in case of emergency.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1499-1 aide security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1499-1-aide/</link>
      <pubDate>Thu, 14 Aug 2025 17:33:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1499-1-aide/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1499-1-aide/">
      
&lt;p&gt;Package : aide&lt;/p&gt;


&lt;p&gt;Version : 0.16.1-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-54409&#34;&gt;CVE-2025-54409&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Rajesh Pangare discovered a vulnerability in aide, an advanced
intrusion detection system. A local attacker can take advantage of these
flaws to crash aide during report printing.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1498-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1498-1-openjpeg2/</link>
      <pubDate>Sun, 10 Aug 2025 18:15:20 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1498-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1498-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.3.0-2&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12973&#34;&gt;CVE-2019-12973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-50952&#34;&gt;CVE-2025-50952&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the JPEG 2000 image library OpenJPEG.&lt;/p&gt;
&lt;p&gt;CVE-2019-12973&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Excessive iterations in convertbmp
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-50952&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Avoid potential undefined behaviour in opj_dwt_decode_tile()
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1497-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1497-1-distro-info-data/</link>
      <pubDate>Sat, 09 Aug 2025 19:30:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1497-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1497-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.41&amp;#43;deb10u2~bpo9&amp;#43;8 (stretch), 0.41&amp;#43;deb10u12 (buster)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian
ELTS users.&lt;/p&gt;
&lt;p&gt;It adds the release and estimated EoL dates for Debian 13 &amp;ldquo;Trixie&amp;rdquo;.
Also included is a new &amp;ldquo;eol-legacy&amp;rdquo; column for Ubuntu Legacy Support.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1496-1 gnutls28 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1496-1-gnutls28/</link>
      <pubDate>Sat, 09 Aug 2025 18:30:42 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1496-1-gnutls28/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1496-1-gnutls28/">
      
&lt;p&gt;Package : gnutls28&lt;/p&gt;


&lt;p&gt;Version : 3.5.8-5&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32988&#34;&gt;CVE-2025-32988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32990&#34;&gt;CVE-2025-32990&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in GnuTLS, a library implementing the SSL, TLS and DTLS protocols.&lt;/p&gt;
&lt;p&gt;CVE-2025-32988&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Double-free upon error when exporting otherName in SAN
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-32990&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;1-byte write buffer overrun in certtool
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1495-1 gnutls28 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1495-1-gnutls28/</link>
      <pubDate>Sat, 09 Aug 2025 18:30:29 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1495-1-gnutls28/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1495-1-gnutls28/">
      
&lt;p&gt;Package : gnutls28&lt;/p&gt;


&lt;p&gt;Version : 3.6.7-4&amp;#43;deb10u14 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6395&#34;&gt;CVE-2025-6395&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32988&#34;&gt;CVE-2025-32988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32990&#34;&gt;CVE-2025-32990&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in GnuTLS, a library implementing the SSL, TLS and DTLS protocols.&lt;/p&gt;
&lt;p&gt;CVE-2025-6395&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL dereference when 2nd Client Hello omits PSK
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-32988&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Double-free upon error when exporting otherName in SAN
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-32990&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;1-byte write buffer overrun in certtool
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1494-1 unrar-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1494-1-unrar-nonfree/</link>
      <pubDate>Sat, 09 Aug 2025 17:59:23 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1494-1-unrar-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1494-1-unrar-nonfree/">
      
&lt;p&gt;Package : unrar-nonfree&lt;/p&gt;


&lt;p&gt;Version : 1:5.6.6-1&amp;#43;deb10u5~deb9u1 (stretch), 1:5.6.6-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33899&#34;&gt;CVE-2024-33899&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;ANSI escape injection has been fixed in UnRAR, an unarchiver for .rar archives.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1493-1 libphp-adodb security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1493-1-libphp-adodb/</link>
      <pubDate>Tue, 05 Aug 2025 23:52:12 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1493-1-libphp-adodb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1493-1-libphp-adodb/">
      
&lt;p&gt;Package : libphp-adodb&lt;/p&gt;


&lt;p&gt;Version : 5.20.9-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46337&#34;&gt;CVE-2025-46337&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;SQL injection in the PostgreSQL driver has been fixed in the ADOdb database access library for PHP.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1492-1 python-setuptools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1492-1-python-setuptools/</link>
      <pubDate>Tue, 05 Aug 2025 12:27:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1492-1-python-setuptools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1492-1-python-setuptools/">
      
&lt;p&gt;Package : python-setuptools&lt;/p&gt;


&lt;p&gt;Version : 33.1.1-1&amp;#43;deb9u1 (stretch), 40.8.0-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40897&#34;&gt;CVE-2022-40897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6345&#34;&gt;CVE-2024-6345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47273&#34;&gt;CVE-2025-47273&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the Python setuptools package.
setuptools is a package that allows users to download, build, install, upgrade,
and uninstall Python packages.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;CVE-2022-40897&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Regular Expression Denial of Service (ReDoS) in package_index.py.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-6345&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A vulnerability in the package_index module allows for remote code
execution via its download functions. These functions, which are used to
download packages from URLs provided by users or retrieved from package
index servers, are susceptible to code injection. If these functions are
exposed to user-controlled inputs, such as package URLs, they can execute
arbitrary commands on the system.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-47273&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A path traversal vulnerability in &lt;code&gt;PackageIndex&lt;/code&gt;. An attacker would be
allowed to write files to arbitrary locations on the filesystem with the
permissions of the process running the Python code, which could escalate to
remote code execution depending on the context.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1491-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1491-1-openjdk-8/</link>
      <pubDate>Fri, 01 Aug 2025 08:52:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1491-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1491-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u462-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30749&#34;&gt;CVE-2025-30749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30754&#34;&gt;CVE-2025-30754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30761&#34;&gt;CVE-2025-30761&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-50106&#34;&gt;CVE-2025-50106&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in denial of service, information disclosure
or bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1490-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1490-1-linux-6.1/</link>
      <pubDate>Thu, 31 Jul 2025 12:54:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1490-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1490-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.140-1~deb9u1 (stretch), 6.1.140-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26618&#34;&gt;CVE-2024-26618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26783&#34;&gt;CVE-2024-26783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26807&#34;&gt;CVE-2024-26807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28956&#34;&gt;CVE-2024-28956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35790&#34;&gt;CVE-2024-35790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36903&#34;&gt;CVE-2024-36903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36927&#34;&gt;CVE-2024-36927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43840&#34;&gt;CVE-2024-43840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46751&#34;&gt;CVE-2024-46751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53203&#34;&gt;CVE-2024-53203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53209&#34;&gt;CVE-2024-53209&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57945&#34;&gt;CVE-2024-57945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21645&#34;&gt;CVE-2025-21645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21839&#34;&gt;CVE-2025-21839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21931&#34;&gt;CVE-2025-21931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22062&#34;&gt;CVE-2025-22062&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37819&#34;&gt;CVE-2025-37819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37890&#34;&gt;CVE-2025-37890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37897&#34;&gt;CVE-2025-37897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37901&#34;&gt;CVE-2025-37901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37903&#34;&gt;CVE-2025-37903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37905&#34;&gt;CVE-2025-37905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37909&#34;&gt;CVE-2025-37909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37911&#34;&gt;CVE-2025-37911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37912&#34;&gt;CVE-2025-37912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37913&#34;&gt;CVE-2025-37913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37914&#34;&gt;CVE-2025-37914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37915&#34;&gt;CVE-2025-37915&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37917&#34;&gt;CVE-2025-37917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37921&#34;&gt;CVE-2025-37921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37923&#34;&gt;CVE-2025-37923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37924&#34;&gt;CVE-2025-37924&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37927&#34;&gt;CVE-2025-37927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37928&#34;&gt;CVE-2025-37928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37929&#34;&gt;CVE-2025-37929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37930&#34;&gt;CVE-2025-37930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37932&#34;&gt;CVE-2025-37932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37936&#34;&gt;CVE-2025-37936&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37947&#34;&gt;CVE-2025-37947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37948&#34;&gt;CVE-2025-37948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37949&#34;&gt;CVE-2025-37949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37951&#34;&gt;CVE-2025-37951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37953&#34;&gt;CVE-2025-37953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37959&#34;&gt;CVE-2025-37959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37961&#34;&gt;CVE-2025-37961&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37962&#34;&gt;CVE-2025-37962&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37963&#34;&gt;CVE-2025-37963&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37964&#34;&gt;CVE-2025-37964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37967&#34;&gt;CVE-2025-37967&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37969&#34;&gt;CVE-2025-37969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37970&#34;&gt;CVE-2025-37970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37972&#34;&gt;CVE-2025-37972&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37990&#34;&gt;CVE-2025-37990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37991&#34;&gt;CVE-2025-37991&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;For CPUs affected to ITS (Indirect Target Selection), to fully mitigate
the vulnerability it is also necessary to update the intel-microcode
packages released in &lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1425-1-intel-microcode/&#34;&gt;ELA-1425-1&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For details on the Indirect Target Selection (ITS) vulnerability please
refer to &lt;a href=&#34;https://www.vusec.net/projects/training-solo/&#34;&gt;the VUSec article&lt;/a&gt; and
&lt;a href=&#34;https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html&#34;&gt;the Intel one&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1489-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1489-1-php7.0/</link>
      <pubDate>Mon, 28 Jul 2025 16:34:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1489-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1489-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u22 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1220&#34;&gt;CVE-2025-1220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1735&#34;&gt;CVE-2025-1735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6491&#34;&gt;CVE-2025-6491&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-1220&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Jihwan Kim discovered that &lt;code&gt;fsockopen()&lt;/code&gt; lack validation that the
hostname supplied does not contain null characters, which may lead
to other functions like &lt;code&gt;parse_url()&lt;/code&gt; to treat the hostname in an
incorrect way, thereby potentially causing Server Side Request
Forgery.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1735&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that &lt;code&gt;pgsql&lt;/code&gt; and &lt;code&gt;pdo_pgsql&lt;/code&gt; escaping functions do
not check if the underlying quoting functions returned errors, which
may lead to crashes due to null pointer dereferences.&lt;/p&gt;
&lt;p&gt;This issue is related to &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1094&#34;&gt;CVE-2025-1094&lt;/a&gt;
which was reported to PostgreSQL.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-6491&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Ahmed Lekssays discovered that &lt;code&gt;SoapVar&lt;/code&gt; instances created with a
fully qualified name larger than 2G could lead to denial of service
due to null pointer dereference.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1488-1 php7.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1488-1-php7.3/</link>
      <pubDate>Mon, 28 Jul 2025 16:34:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1488-1-php7.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1488-1-php7.3/">
      
&lt;p&gt;Package : php7.3&lt;/p&gt;


&lt;p&gt;Version : 7.3.31-1~deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1220&#34;&gt;CVE-2025-1220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1735&#34;&gt;CVE-2025-1735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6491&#34;&gt;CVE-2025-6491&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-1220&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Jihwan Kim discovered that &lt;code&gt;fsockopen()&lt;/code&gt; lack validation that the
hostname supplied does not contain null characters, which may lead
to other functions like &lt;code&gt;parse_url()&lt;/code&gt; to treat the hostname in an
incorrect way, thereby potentially causing Server Side Request
Forgery.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1735&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that &lt;code&gt;pgsql&lt;/code&gt; and &lt;code&gt;pdo_pgsql&lt;/code&gt; escaping functions do
not check if the underlying quoting functions returned errors, which
may lead to crashes due to null pointer dereferences.&lt;/p&gt;
&lt;p&gt;This issue is related to &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1094&#34;&gt;CVE-2025-1094&lt;/a&gt;
which was reported to PostgreSQL.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-6491&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Ahmed Lekssays discovered that &lt;code&gt;SoapVar&lt;/code&gt; instances created with a
fully qualified name larger than 2G could lead to denial of service
due to null pointer dereference.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1487-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1487-1-libxml2/</link>
      <pubDate>Mon, 28 Jul 2025 11:40:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1487-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1487-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u14 (stretch), 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u12 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34459&#34;&gt;CVE-2024-34459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6021&#34;&gt;CVE-2025-6021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6170&#34;&gt;CVE-2025-6170&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49794&#34;&gt;CVE-2025-49794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49796&#34;&gt;CVE-2025-49796&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2024-34459&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Zhineng Zhong discovered that formatting error messages with &lt;code&gt;xmllint --htmlout&lt;/code&gt; could result in a buffer over-read.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-6021&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Ahmed Lekssays discovered an integer overflow issue in
&lt;code&gt;xmlBuildQName()&lt;/code&gt; which could result in memory corruption or a
denial of service when processing crafted input.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-6170&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Ahmed Lekssays discovered a stack-based buffer overflow issue in the
command-parsing logic of the interactive shell in xmllint.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-49794&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Nikita Sveshnikov discovered a heap use-after-free issue in the
schematron.  When processing XPath expressions in Schematron schema
elements &lt;code&gt;&amp;lt;sch:name path=&amp;quot;…&amp;quot;/&amp;gt;&lt;/code&gt;, a pointer to freed memory is
returned and then accessed, leading to undefined behavior or
potential crashes.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-49796&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Nikita Sveshnikov discovered a type confusion issue in the
schematron.  Processing &lt;code&gt;sch:name&lt;/code&gt; elements and accessing namespace
information may lead to leading to memory corruption or undefined
behavior.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1486-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1486-1-openjdk-11/</link>
      <pubDate>Wed, 23 Jul 2025 12:34:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1486-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1486-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.28&amp;#43;6-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30749&#34;&gt;CVE-2025-30749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30754&#34;&gt;CVE-2025-30754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30761&#34;&gt;CVE-2025-30761&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-50059&#34;&gt;CVE-2025-50059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-50106&#34;&gt;CVE-2025-50106&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in denial of service, information disclosure
or bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1485-1 djvulibre security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1485-1-djvulibre/</link>
      <pubDate>Mon, 21 Jul 2025 16:53:58 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1485-1-djvulibre/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1485-1-djvulibre/">
      
&lt;p&gt;Package : djvulibre&lt;/p&gt;


&lt;p&gt;Version : 3.5.27.1-7&amp;#43;deb9u3 (stretch), 3.5.27.1-10&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46312&#34;&gt;CVE-2021-46312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-53367&#34;&gt;CVE-2025-53367&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in DjVuLibre, a library and tools to handle documents in the DjVu format.&lt;/p&gt;
&lt;p&gt;CVE-2021-46312&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Divide by zero in IWBitmap::Encode::init()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-53367&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in MMRDecoder
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1484-1 dcmtk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1484-1-dcmtk/</link>
      <pubDate>Mon, 21 Jul 2025 15:11:43 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1484-1-dcmtk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1484-1-dcmtk/">
      
&lt;p&gt;Package : dcmtk&lt;/p&gt;


&lt;p&gt;Version : 3.6.1~20160216-4.1&amp;#43;deb9u2 (stretch), 3.6.4-2.1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2119&#34;&gt;CVE-2022-2119&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2120&#34;&gt;CVE-2022-2120&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2357&#34;&gt;CVE-2025-2357&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-25472&#34;&gt;CVE-2025-25472&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-25474&#34;&gt;CVE-2025-25474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-25475&#34;&gt;CVE-2025-25475&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in DCMTK, a collection of libraries and applications implementing large parts the DICOM standard for medical images.&lt;/p&gt;
&lt;p&gt;CVE-2022-2119&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Path traversal vulnerability
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2120&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Path traversal vulnerability
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-2357&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Segfault in JPEG-LS decoder
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-25472&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;DoS with invalid mono images
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-25474&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow with invalid images
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-25475&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1483-1 freerdp2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1483-1-freerdp2/</link>
      <pubDate>Fri, 18 Jul 2025 23:25:36 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1483-1-freerdp2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1483-1-freerdp2/">
      
&lt;p&gt;Package : freerdp2&lt;/p&gt;


&lt;p&gt;Version : 2.3.0&amp;#43;dfsg1-2&amp;#43;deb11u3~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24882&#34;&gt;CVE-2022-24882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39320&#34;&gt;CVE-2022-39320&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22211&#34;&gt;CVE-2024-22211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32039&#34;&gt;CVE-2024-32039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32040&#34;&gt;CVE-2024-32040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32041&#34;&gt;CVE-2024-32041&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32458&#34;&gt;CVE-2024-32458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32459&#34;&gt;CVE-2024-32459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32460&#34;&gt;CVE-2024-32460&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32658&#34;&gt;CVE-2024-32658&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32659&#34;&gt;CVE-2024-32659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32660&#34;&gt;CVE-2024-32660&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32661&#34;&gt;CVE-2024-32661&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in freerdp2, an implementation of the Remote Desktop Protocol.&lt;/p&gt;
&lt;p&gt;CVE-2022-24882&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Server side NTLM does not properly check parameters
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39320&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer overflow in urbdrc channel
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22211&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in freerdp_bitmap_planar_context_reset 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32039&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow and Out of bounds write in clear_decompress_residual_data 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32040&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer underflow in nsc_rle_decode 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32041&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read in zgfx_decompress_segment
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32458&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read in planar_skip_plane_rle
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32459&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read in ncrush_decompress
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32460&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read in interleaved_decompress 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32658&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read in ExtractRunLengthRegular*
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32659&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read in freerdp_image_copy
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32660&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of memory in zgfx_decompress
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32661&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL dereference in rdp_write_logon_info_v1
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1482-1 commons-beanutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1482-1-commons-beanutils/</link>
      <pubDate>Thu, 17 Jul 2025 23:54:04 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1482-1-commons-beanutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1482-1-commons-beanutils/">
      
&lt;p&gt;Package : commons-beanutils&lt;/p&gt;


&lt;p&gt;Version : 1.9.3-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48734&#34;&gt;CVE-2025-48734&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Improper access control has been fixed in Apache Commons BeanUtils, Java classes for working with JavaBeans classes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1481-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1481-1-redis/</link>
      <pubDate>Mon, 14 Jul 2025 15:28:14 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1481-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1481-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 3:3.2.6-3&amp;#43;deb9u16 (stretch), 5:5.0.14-1&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32023&#34;&gt;CVE-2025-32023&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48367&#34;&gt;CVE-2025-48367&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues were discovered in &lt;a href=&#34;https://redis.io/&#34;&gt;Redis&lt;/a&gt;, the key-value database:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CVE-2025-32023&lt;/code&gt;: An authenticated user may have used a
specially-crafted string to trigger a stack/heap out-of-bounds write during
hyperloglog operations, potentially leading to a remote code execution
vulnerability. Installations that used Redis&amp;rsquo; ACL system to restrict
hyperloglog &lt;code&gt;HLL&lt;/code&gt; commands are unaffected by this issue.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CVE-2025-48367&lt;/code&gt;: An unauthenticated connection could have caused
repeated IP protocol errors, leading to client starvation and ultimately
become a Denial of Service (DoS) attack.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1480-1 varnish security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1480-1-varnish/</link>
      <pubDate>Thu, 10 Jul 2025 07:37:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1480-1-varnish/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1480-1-varnish/">
      
&lt;p&gt;Package : varnish&lt;/p&gt;


&lt;p&gt;Version : 5.0.0-7&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47905&#34;&gt;CVE-2025-47905&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A client-side desync vulnerability can be triggered in Varnish Cache, a state
of the art, high-performance web accelerator. An attacker can abuse a flaw in
Varnish’s handling of chunked transfer encoding which allows certain malformed
HTTP/1 requests to exploit improper framing of the message body to smuggle
additional requests. Specifically, Varnish incorrectly permits CRLF to be
skipped to delimit chunk boundaries.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1479-1 commons-vfs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1479-1-commons-vfs/</link>
      <pubDate>Tue, 01 Jul 2025 00:38:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1479-1-commons-vfs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1479-1-commons-vfs/">
      
&lt;p&gt;Package : commons-vfs&lt;/p&gt;


&lt;p&gt;Version : 2.1-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27553&#34;&gt;CVE-2025-27553&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in Apache Commons VFS, a Java API for accessing
various filesystems.&lt;/p&gt;
&lt;p&gt;CVE-2025-27553&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A relative path traversal vulnerability was discovered in Apache Commons
VFS. The FileObject API in Commons VFS has a &#39;resolveFile&#39; method that
takes a &#39;scope&#39; parameter. Specifying &#39;NameScope.DESCENDENT&#39; promises that
&amp;quot;an exception is thrown if the resolved file is not a descendent of the
base file&amp;quot;. But when a path contains encoded &amp;quot;..&amp;quot; characters (for example,
&amp;quot;%2E%2E/bar.txt&amp;quot;), it might return file objects that are not a descendent
of the base file, without throwing an exception.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1478-1 rar security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1478-1-rar/</link>
      <pubDate>Mon, 30 Jun 2025 22:28:34 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1478-1-rar/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1478-1-rar/">
      
&lt;p&gt;Package : rar&lt;/p&gt;


&lt;p&gt;Version : 2:7.01-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33899&#34;&gt;CVE-2024-33899&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;ANSI escape injection has been fixed in the RAR archiver.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1477-1 jessie-elts end of life</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1477-1-jessie-elts/</link>
      <pubDate>Mon, 30 Jun 2025 15:31:34 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1477-1-jessie-elts/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1477-1-jessie-elts/">
      
&lt;p&gt;Package : jessie-elts&lt;/p&gt;



      &lt;p&gt;The Extended Long Term Support (ELTS) Team hereby announces that Debian 8
&amp;ldquo;Jessie&amp;rdquo; support has reached its end-of-life today, June 30, 2025,
ten years after its initial release on April 26th, 2015.&lt;/p&gt;
&lt;p&gt;We strongly encourage any remaining Jessie users to upgrade to a supported
Debian version. The ELTS Team will continue to provide security support for
Debian 9 &amp;ldquo;Stretch&amp;rdquo; and Debian 10 &amp;ldquo;Buster&amp;rdquo;, while Debian 11 &amp;ldquo;Bullseye&amp;rdquo; and
Debian 12 &amp;ldquo;Bookworm&amp;rdquo; are still supported by Debian.&lt;/p&gt;
&lt;p&gt;Freexian and the ELTS Team would like to thank all the users that made Debian 8
ELTS possible, and we invite any interested parties to contribute to the
extended support of the still supported Debian releases.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1476-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1476-1-sudo/</link>
      <pubDate>Mon, 30 Jun 2025 16:30:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1476-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1476-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.10p3-1&amp;#43;deb8u10 (jessie), 1.8.19p1-2.1&amp;#43;deb9u7 (stretch), 1.8.27-1&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32462&#34;&gt;CVE-2025-32462&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Rich Mirch discovered that sudo, a program designed to provide limited
super user privileges to specific users, does not correctly handle the
host (-h or &amp;ndash;host) option. Due to a bug the host option was not
restricted to listing privileges only and could be used when running a
command via sudo or editing a file with sudoedit. Depending on the rules
present in the sudoers file the flaw might allow a local privilege
escalation attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1475-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1475-1-gst-plugins-good1.0/</link>
      <pubDate>Mon, 30 Jun 2025 15:23:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1475-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1475-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.10.4-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47537&#34;&gt;CVE-2024-47537&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47540&#34;&gt;CVE-2024-47540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47544&#34;&gt;CVE-2024-47544&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47596&#34;&gt;CVE-2024-47596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47599&#34;&gt;CVE-2024-47599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47601&#34;&gt;CVE-2024-47601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47602&#34;&gt;CVE-2024-47602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47603&#34;&gt;CVE-2024-47603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47606&#34;&gt;CVE-2024-47606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47613&#34;&gt;CVE-2024-47613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47774&#34;&gt;CVE-2024-47774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47775&#34;&gt;CVE-2024-47775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47776&#34;&gt;CVE-2024-47776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47777&#34;&gt;CVE-2024-47777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47778&#34;&gt;CVE-2024-47778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47834&#34;&gt;CVE-2024-47834&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework and its codecs and demuxers, which may result in denial
of service or potentially the execution of arbitrary code if a malformed
media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1474-1 catdoc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1474-1-catdoc/</link>
      <pubDate>Mon, 30 Jun 2025 13:56:12 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1474-1-catdoc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1474-1-catdoc/">
      
&lt;p&gt;Package : catdoc&lt;/p&gt;


&lt;p&gt;Version : 1:0.94.3~git20160113.dbc9ec6&amp;#43;dfsg-1&amp;#43;deb9u2 (stretch), 1:0.95-4.1&amp;#43;deb11u1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48877&#34;&gt;CVE-2024-48877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52035&#34;&gt;CVE-2024-52035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-54028&#34;&gt;CVE-2024-54028&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in catdoc, a text extractor for MS-Office files.&lt;/p&gt;
&lt;p&gt;CVE-2024-48877&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;memory corruption
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-52035&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-54028&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;integer underflow
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1473-1 python-tornado security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1473-1-python-tornado/</link>
      <pubDate>Mon, 30 Jun 2025 02:42:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1473-1-python-tornado/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1473-1-python-tornado/">
      
&lt;p&gt;Package : python-tornado&lt;/p&gt;


&lt;p&gt;Version : 5.1.1-4&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47287&#34;&gt;CVE-2025-47287&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in python-tornado, a scalable,
non-blocking Python web framework and asynchronous networking library.&lt;/p&gt;
&lt;p&gt;CVE-2025-47287&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When Tornado&#39;s &#39;multipart/form-data&#39; parser encounters certain errors,
it logs a warning but continues trying to parse the remainder of the
data. This allows remote attackers to generate an extremely high volume
of logs, constituting a DoS attack. This DoS is compounded by the fact
that the logging subsystem is synchronous.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1472-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1472-1-xorg-server/</link>
      <pubDate>Thu, 26 Jun 2025 10:02:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1472-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1472-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u19 (jessie), 2:1.19.2-1&amp;#43;deb9u22 (stretch), 2:1.20.4-1&amp;#43;deb10u17 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49175&#34;&gt;CVE-2025-49175&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49176&#34;&gt;CVE-2025-49176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49178&#34;&gt;CVE-2025-49178&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49179&#34;&gt;CVE-2025-49179&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49180&#34;&gt;CVE-2025-49180&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Nils Emmerich discovered several vulnerabilities in the Xorg X server,
which may result in privilege escalation if the X server is running
privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1471-1 symfony security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1471-1-symfony/</link>
      <pubDate>Tue, 24 Jun 2025 20:42:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1471-1-symfony/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1471-1-symfony/">
      
&lt;p&gt;Package : symfony&lt;/p&gt;


&lt;p&gt;Version : 3.4.22&amp;#43;dfsg-2&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50343&#34;&gt;CVE-2024-50343&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50345&#34;&gt;CVE-2024-50345&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2024-50343&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered input ending with &lt;code&gt;\n&lt;/code&gt; could bypass Validators.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-50345&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Sam Mush discovered that due to URI parsing mismatch between common
browsers and the Request class, an attacker could supply a specially
crafted URI to bypass validation and redirect users to another
domain.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1470-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1470-1-python-django/</link>
      <pubDate>Mon, 23 Jun 2025 17:14:46 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1470-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1470-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u21 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43665&#34;&gt;CVE-2023-43665&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential denial-of-service vulnerability was uncovered in Django, a popular
Python-based web-development framework.&lt;/p&gt;
&lt;p&gt;Following the fix for &lt;code&gt;CVE-2019-14232&lt;/code&gt;, the regular expressions used in the
implementation of &lt;code&gt;django.utils.text.Truncator&lt;/code&gt;&amp;rsquo;s &lt;code&gt;chars()&lt;/code&gt; and &lt;code&gt;words()&lt;/code&gt;
methods (with &lt;code&gt;html=True&lt;/code&gt;) were revised and improved. However, these
regular expressions still exhibited linear backtracking complexity, so
when given a very long, potentially malformed HTML input, the evaluation would
still be slow, leading to a potential denial of service vulnerability.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;chars()&lt;/code&gt; and &lt;code&gt;words()&lt;/code&gt; methods are used to implement the
&lt;code&gt;truncatechars_html&lt;/code&gt; and &lt;code&gt;truncatewords_html&lt;/code&gt; template filters, which were thus
also vulnerable.&lt;/p&gt;
&lt;p&gt;The input processed by &lt;code&gt;Truncator&lt;/code&gt;, when operating in HTML mode, has been
limited to the first five million characters in order to avoid potential
performance and memory issues.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1469-1 auto-apt-proxy bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1469-1-auto-apt-proxy/</link>
      <pubDate>Mon, 23 Jun 2025 09:21:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1469-1-auto-apt-proxy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1469-1-auto-apt-proxy/">
      
&lt;p&gt;Package : auto-apt-proxy&lt;/p&gt;


&lt;p&gt;Version : 11&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;auto-apt-proxy no longer attempts to look up a network interface name as a hostname and thereby avoids running into a timeout that caused autopkgtests of other packages to fail.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1468-1 poppler security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1468-1-poppler/</link>
      <pubDate>Sat, 21 Jun 2025 07:47:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1468-1-poppler/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1468-1-poppler/">
      
&lt;p&gt;Package : poppler&lt;/p&gt;


&lt;p&gt;Version : 0.48.0-2&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7515&#34;&gt;CVE-2017-7515&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14617&#34;&gt;CVE-2017-14617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20551&#34;&gt;CVE-2018-20551&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9903&#34;&gt;CVE-2019-9903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-23804&#34;&gt;CVE-2020-23804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37050&#34;&gt;CVE-2022-37050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37051&#34;&gt;CVE-2022-37051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37052&#34;&gt;CVE-2022-37052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38349&#34;&gt;CVE-2022-38349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56378&#34;&gt;CVE-2024-56378&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32364&#34;&gt;CVE-2025-32364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32365&#34;&gt;CVE-2025-32365&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in poppler, a PDF rendering
library, which could result in denial of service. An attacker could
make poppler-based applications crash through various means.&lt;/p&gt;
&lt;p&gt;Additionally, boomaga (BOOklet MAnager), a virtual preview printer,
was rebuilt to handle ABI-breaking changes in the poppler private API.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-7515&lt;/p&gt;
&lt;p&gt;An uncontrolled recursion in pdfunite resulting into potential
denial-of-service. Note: the fix is a pre-requisite for
CVE-2019-9903&amp;rsquo;s.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-14617&lt;/p&gt;
&lt;p&gt;Complete fix, initially fix was in 0.48.0-2+deb9u1. For reference:&lt;/p&gt;
&lt;p&gt;A floating point exception occurs in the ImageStream class in
Stream.cc, which may lead to a potential attack when handling
malicious PDF files.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-20551&lt;/p&gt;
&lt;p&gt;A reachable Object::getString assertion allows attackers to cause
a denial of service due to construction of invalid rich media
annotation assets in the AnnotRichMedia class in Annot.c.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-9903&lt;/p&gt;
&lt;p&gt;PDFDoc::markObject in PDFDoc.cc mishandles dict marking, leading
to stack consumption in the function Dict::find() located at
Dict.cc, which can (for example) be triggered by passing a crafted
pdf file to the pdfunite binary.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-23804&lt;/p&gt;
&lt;p&gt;Uncontrolled Recursion in pdfinfo, and pdftops allows remote
attackers to cause a denial of service via crafted input.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-37050&lt;/p&gt;
&lt;p&gt;PDFDoc::savePageAs in PDFDoc.c callows attackers to cause a
denial-of-service (application crashes with SIGABRT) by crafting a
PDF file in which the xref data structure is mishandled in
getCatalog processing. Note that this vulnerability is caused by
the incomplete patch of CVE-2018-20662.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-37051&lt;/p&gt;
&lt;p&gt;A reachable abort which leads to denial of service because the
main function in pdfunite.cc lacks a stream check before saving an
embedded file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-37052&lt;/p&gt;
&lt;p&gt;A reachable Object::getString assertion allows attackers to cause
a denial of service due to a failure in markObject.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-38349&lt;/p&gt;
&lt;p&gt;There is a reachable assertion in Object.h, will lead to denial of
service because PDFDoc::replacePageDict in PDFDoc.cc lacks a
stream check before saving an embedded file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-56378&lt;/p&gt;
&lt;p&gt;Out-of-bounds read vulnerability within the JBIG2Bitmap::combine
function in JBIG2Stream.cc.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32364&lt;/p&gt;
&lt;p&gt;A floating-point exception in the PSStack::roll function can cause
an application to crash when handling malformed inputs associated
with INT_MIN.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32365&lt;/p&gt;
&lt;p&gt;Poppler allows crafted input files to trigger out-of-bounds reads
in the JBIG2Bitmap::combine function in JBIG2Stream.cc because of
a misplaced isOk check.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1467-1 poppler security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1467-1-poppler/</link>
      <pubDate>Sat, 21 Jun 2025 07:47:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1467-1-poppler/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1467-1-poppler/">
      
&lt;p&gt;Package : poppler&lt;/p&gt;


&lt;p&gt;Version : 0.71.0-5&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37052&#34;&gt;CVE-2022-37052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38349&#34;&gt;CVE-2022-38349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56378&#34;&gt;CVE-2024-56378&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32364&#34;&gt;CVE-2025-32364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32365&#34;&gt;CVE-2025-32365&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in poppler, a PDF rendering
library, which could result in denial of service. An attacker could
make poppler-based applications crash through various means.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-37052&lt;/p&gt;
&lt;p&gt;A reachable Object::getString assertion allows attackers to cause
a denial of service due to a failure in markObject.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-38349&lt;/p&gt;
&lt;p&gt;There is a reachable assertion in Object.h, will lead to denial of
service because PDFDoc::replacePageDict in PDFDoc.cc lacks a
stream check before saving an embedded file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-56378&lt;/p&gt;
&lt;p&gt;Out-of-bounds read vulnerability within the JBIG2Bitmap::combine
function in JBIG2Stream.cc.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32364&lt;/p&gt;
&lt;p&gt;A floating-point exception in the PSStack::roll function can cause
an application to crash when handling malformed inputs associated
with INT_MIN.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32365&lt;/p&gt;
&lt;p&gt;Poppler allows crafted input files to trigger out-of-bounds reads
in the JBIG2Bitmap::combine function in JBIG2Stream.cc because of
a misplaced isOk check.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1466-1 konsole security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1466-1-konsole/</link>
      <pubDate>Fri, 20 Jun 2025 11:08:27 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1466-1-konsole/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1466-1-konsole/">
      
&lt;p&gt;Package : konsole&lt;/p&gt;


&lt;p&gt;Version : 4:18.04.0-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49091&#34;&gt;CVE-2025-49091&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential remote code execution
vulnerability in &lt;code&gt;konsole&lt;/code&gt;, the X terminal emulator of the KDE desktop
environment.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1465-1 libblockdev security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1465-1-libblockdev/</link>
      <pubDate>Tue, 17 Jun 2025 23:52:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1465-1-libblockdev/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1465-1-libblockdev/">
      
&lt;p&gt;Package : libblockdev&lt;/p&gt;


&lt;p&gt;Version : 2.20-7&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-6019&#34;&gt;CVE-2025-6019&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Threat Research Unit (TRU) discovered a local privilege
escalation vulnerability in libblockdev, a library for manipulating
block devices. An &amp;ldquo;allow_active&amp;rdquo; user can exploit this flaw via the
udisks daemon to obtain the full privileges of the root user.&lt;/p&gt;
&lt;p&gt;Details can be found in the Qualys advisory at
&lt;a href=&#34;https://www.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt&#34;&gt;https://www.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Along with the libblockdev update, updated udisks2 packages are
released, to enforce that private mounts are mounted with
&amp;rsquo;nodev,nosuid&#39;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1464-1 gst-plugins-bad1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1464-1-gst-plugins-bad1.0/</link>
      <pubDate>Tue, 17 Jun 2025 23:51:50 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1464-1-gst-plugins-bad1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1464-1-gst-plugins-bad1.0/">
      
&lt;p&gt;Package : gst-plugins-bad1.0&lt;/p&gt;


&lt;p&gt;Version : 1.10.4-1&amp;#43;deb9u6 (stretch), 1.14.4-1&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3887&#34;&gt;CVE-2025-3887&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A stack buffer-overflow in the H.265 codec parser has been fixed in the &amp;ldquo;bad&amp;rdquo; set of codecs for the GStreamer multimedia framework.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1463-1 mercurial security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1463-1-mercurial/</link>
      <pubDate>Tue, 17 Jun 2025 14:22:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1463-1-mercurial/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1463-1-mercurial/">
      
&lt;p&gt;Package : mercurial&lt;/p&gt;


&lt;p&gt;Version : 4.0-1&amp;#43;deb9u3 (stretch), 4.8.2-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2361&#34;&gt;CVE-2025-2361&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A cross-site scripting vulnerability was discovered in hgweb, the
integrated stand-alone web interface of the Mercurial version control
system.&lt;/p&gt;
&lt;p&gt;This update also stabilizes the test suites.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1462-1 roundcube security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1462-1-roundcube/</link>
      <pubDate>Tue, 17 Jun 2025 00:28:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1462-1-roundcube/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1462-1-roundcube/">
      
&lt;p&gt;Package : roundcube&lt;/p&gt;


&lt;p&gt;Version : 1.3.17&amp;#43;dfsg.1-1~deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-49113&#34;&gt;CVE-2025-49113&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Kirill Firsov discovered that Roundcube, a skinnable AJAX based webmail
solution for IMAP servers, was performing PHP Object deserialization on
unvalidated input, which could lead to remote code execution by an
authenticated attacker.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1348-2 python2.7 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1348-2-python2.7/</link>
      <pubDate>Mon, 16 Jun 2025 22:56:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1348-2-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1348-2-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.13-2&amp;#43;deb9u11 (stretch)&lt;/p&gt;


      &lt;p&gt;The fix for CVE-2023-27043 made the email.utils.getaddresses function
return results with an additional conversion from Python string object
(str) to Unicode object (unicode). This can lead to a change in
corner-case situations, as spotted in the Mercurial test suite. The
fix was adapted to restore the previous behavior.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1347-2 python2.7 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1347-2-python2.7/</link>
      <pubDate>Mon, 16 Jun 2025 22:28:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1347-2-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1347-2-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.16-2&amp;#43;deb10u6 (buster)&lt;/p&gt;


      &lt;p&gt;The fix for CVE-2023-27043 made the email.utils.getaddresses function
return results with an additional conversion from Python string object
(str) to Unicode object (unicode). This can lead to a change in
corner-case situations, as spotted in the Mercurial test suite. The
fix was adapted to restore the previous behavior.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1461-1 icu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1461-1-icu/</link>
      <pubDate>Sun, 15 Jun 2025 23:58:46 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1461-1-icu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1461-1-icu/">
      
&lt;p&gt;Package : icu&lt;/p&gt;


&lt;p&gt;Version : 52.1-8&amp;#43;deb8u10 (jessie), 57.1-6&amp;#43;deb9u6 (stretch), 63.1-6&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5222&#34;&gt;CVE-2025-5222&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A stack-based buffer overflow has been fixed in ICU, a C++ and C library for Unicode and Globalization support.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1460-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1460-1-libreoffice/</link>
      <pubDate>Fri, 13 Jun 2025 23:43:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1460-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1460-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3&amp;#43;deb9u7 (stretch), 1:6.1.5-3&amp;#43;deb10u16 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1080&#34;&gt;CVE-2025-1080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2866&#34;&gt;CVE-2025-2866&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in libreoffice, a popular office productivity suite.&lt;/p&gt;
&lt;p&gt;CVE-2025-1080&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice
with MS SharePoint server. An additional scheme &#39;vnd.libreoffice.command&#39; specific
to LibreOffice was added. In the affected versions of LibreOffice a link in a browser
using that scheme could be constructed with an embedded inner URL that when passed
to LibreOffice could call internal macros with arbitrary arguments.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-2866&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows
PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice
a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid
signatures to be accepted as valid.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1459-1 u-boot security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1459-1-u-boot/</link>
      <pubDate>Fri, 13 Jun 2025 16:55:47 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1459-1-u-boot/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1459-1-u-boot/">
      
&lt;p&gt;Package : u-boot&lt;/p&gt;


&lt;p&gt;Version : 2016.11&amp;#43;dfsg1-4&amp;#43;deb9u1 (stretch), 2019.01&amp;#43;dfsg-7&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13103&#34;&gt;CVE-2019-13103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13104&#34;&gt;CVE-2019-13104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13106&#34;&gt;CVE-2019-13106&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14192&#34;&gt;CVE-2019-14192&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14193&#34;&gt;CVE-2019-14193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14194&#34;&gt;CVE-2019-14194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14195&#34;&gt;CVE-2019-14195&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14196&#34;&gt;CVE-2019-14196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14197&#34;&gt;CVE-2019-14197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14198&#34;&gt;CVE-2019-14198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14199&#34;&gt;CVE-2019-14199&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14200&#34;&gt;CVE-2019-14200&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14201&#34;&gt;CVE-2019-14201&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14202&#34;&gt;CVE-2019-14202&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14203&#34;&gt;CVE-2019-14203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14204&#34;&gt;CVE-2019-14204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8432&#34;&gt;CVE-2020-8432&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10648&#34;&gt;CVE-2020-10648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2347&#34;&gt;CVE-2022-2347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30552&#34;&gt;CVE-2022-30552&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30790&#34;&gt;CVE-2022-30790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34835&#34;&gt;CVE-2022-34835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57256&#34;&gt;CVE-2024-57256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57258&#34;&gt;CVE-2024-57258&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in u-boot, a boot loader for embedded systems.&lt;/p&gt;
&lt;p&gt;CVE-2019-13103&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted self-referential DOS partition table will cause all Das U-Boot
versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow
infinitely and eventually either crash or overwrite other data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13104&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause
memcpy() to overwrite a very large amount of data (including the whole stack)
while reading a crafted ext4 filesystem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13106&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data
while reading a crafted ext4 filesystem, which results in a stack buffer
overflow and likely code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14192&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy when parsing a UDP packet due to a net_process_received_packet integer
underflow during an nc_input_packet call.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14193&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with an unvalidated length at nfs_readlink_reply, in the &amp;quot;if&amp;quot; block
after calculating the new path length.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14194&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with a failed length check at nfs_read_reply when calling store_block in
the NFSv2 case.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14195&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with unvalidated length at nfs_readlink_reply in the &amp;quot;else&amp;quot; block after
calculating the new path length.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14196&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with a failed length check at nfs_lookup_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14197&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is a read of
out-of-bounds data at nfs_read_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14198&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with a failed length check at nfs_read_reply when calling store_block in
the NFSv3 case.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14199&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy when parsing a UDP packet due to a net_process_received_packet integer
underflow during an *udp_packet_handler call.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14200&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14201&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14202&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14203&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8432&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c
do_rename_gpt_parts() function. Double freeing may result in a write-what-where
condition, allowing an attacker to execute arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10648&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Das U-Boot through 2020.01 allows attackers to bypass verified boot
restrictions and subsequently boot arbitrary images by providing a crafted FIT
image to a system configured to boot the default configuration.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2347&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There exists an unchecked length field in UBoot. The U-Boot DFU implementation
does not bound the length field in USB DFU download setup packets, and it does
not verify that the transfer direction corresponds to the specified command.
Consequently, if a physical attacker crafts a USB DFU download setup packet
with a `wLength` greater than 4096 bytes, they can write beyond the
heap-allocated request buffer.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30552&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Das U-Boot 2022.01 has a Buffer Overflow.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30790&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Das U-Boot 2022.01 has a Buffer Overflow, a different issue than
CVE-2022-30552.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-34835&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant
stack-based buffer overflow in the &amp;quot;i2c md&amp;quot; command enables the corruption of
the return address pointer of the do_i2c_md function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-57256&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1
occurs for zalloc (adding one to an le32 variable) via a crafted ext4
filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and
resultant memory overwrite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-57258&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur
for a crafted squashfs filesystem via sbrk, via request2size, or because
ptrdiff_t is mishandled on x86_64.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1458-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1458-1-python-django/</link>
      <pubDate>Fri, 13 Jun 2025 11:45:09 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1458-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1458-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u26 (stretch), 1:1.11.29-1&amp;#43;deb10u15 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43665&#34;&gt;CVE-2023-43665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24680&#34;&gt;CVE-2024-24680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32873&#34;&gt;CVE-2025-32873&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A number of vulnerabilities were found in Django, a Python-based
web-development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-43665: Address a denial-of-service possibility in
&lt;code&gt;django.utils.text.Truncator&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Following the fix for CVE-2019-14232, the regular expressions used in the
implementation of &lt;code&gt;django.utils.text.Truncator&lt;/code&gt;&amp;rsquo;s &lt;code&gt;chars()&lt;/code&gt; and &lt;code&gt;words()&lt;/code&gt;
methods (with &lt;code&gt;html=True&lt;/code&gt;) were revised and improved. However, these regular
expressions still exhibited linear backtracking complexity, so when given a
very long, potentially malformed HTML input, the evaluation would still be
slow, leading to a potential denial of service vulnerability. The &lt;code&gt;chars()&lt;/code&gt;
and &lt;code&gt;words()&lt;/code&gt; methods are used to implement the &lt;code&gt;truncatechars_html&lt;/code&gt; and
&lt;code&gt;truncatewords_html&lt;/code&gt; template filters, which were thus also vulnerable.  The
input processed by &lt;code&gt;Truncator&lt;/code&gt;, when operating in HTML mode, has been limited
to the first five million characters in order to avoid potential performance
and memory issues.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-24680: Potential denial-of-service in &lt;code&gt;intcomma&lt;/code&gt; template filter.
The &lt;code&gt;intcomma&lt;/code&gt; template filter was subject to a potential denial-of-service
attack when used with very long strings.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32873: Denial-of-service possibility in &lt;code&gt;strip_tags()&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;django.utils.html.strip_tags()&lt;/code&gt; would be slow to evaluate certain inputs
containing large sequences of incomplete HTML tags. This function is used to
implement the &lt;code&gt;striptags&lt;/code&gt; template filter, which was therefore also
vulnerable.  &lt;code&gt;strip_tags()&lt;/code&gt; now raises a &lt;code&gt;SuspiciousOperation&lt;/code&gt; exception if
it encounters an unusually large number of unclosed opening tags.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1457-1 varnish security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1457-1-varnish/</link>
      <pubDate>Fri, 13 Jun 2025 18:06:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1457-1-varnish/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1457-1-varnish/">
      
&lt;p&gt;Package : varnish&lt;/p&gt;


&lt;p&gt;Version : 6.1.1-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30346&#34;&gt;CVE-2025-30346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47905&#34;&gt;CVE-2025-47905&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two client-side desync vulnerabilities can be triggered in Varnish, a
high-performance web accelerator. An attacker can exploit these flaws when
using malformed HTTP/1 requests. The primary risk of these vulnerabilities is
enabling HTTP request smuggling attacks which could lead to cache poisoning or
the bypass of a web application firewall.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1456-1 ublock-origin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1456-1-ublock-origin/</link>
      <pubDate>Thu, 12 Jun 2025 23:20:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1456-1-ublock-origin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1456-1-ublock-origin/">
      
&lt;p&gt;Package : ublock-origin&lt;/p&gt;


&lt;p&gt;Version : 1.62.0&amp;#43;dfsg-0&amp;#43;deb9u2 (stretch), 1.62.0&amp;#43;dfsg-0&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4215&#34;&gt;CVE-2025-4215&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in ublock-origin, an efficient ads, malware and tracker
blocker. A remote attacker could abuse an inefficient regular expression in
ublock-origin&amp;rsquo;s filters to cause a denial-of-service and freeze a web browser.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1455-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1455-1-curl/</link>
      <pubDate>Mon, 09 Jun 2025 22:38:21 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1455-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1455-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u29 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27534&#34;&gt;CVE-2023-27534&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28321&#34;&gt;CVE-2023-28321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28322&#34;&gt;CVE-2023-28322&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Three security issues were found in Curl, an easy-to-use client-side URL
transfer library and command line tool:&lt;/p&gt;
&lt;p&gt;CVE-2023-27534&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A path traversal vulnerability exists in curl &amp;lt;8.0.0 SFTP implementation
causes the tilde (~) character to be wrongly replaced when used as a prefix
in the first path element, in addition to its intended use as the first
element to indicate a path relative to the user&#39;s home directory. Attackers
can exploit this flaw to bypass filtering or execute arbitrary code by
crafting a path like /~2/foo while accessing a server with a specific user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28321&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An improper certificate validation vulnerability exists in curl &amp;lt;v8.1.0 in
the way it supports matching of wildcard patterns when listed as &amp;quot;Subject
Alternative Name&amp;quot; in TLS server certificates. curl can be built to use its
own name matching function for TLS rather than one provided by a TLS
library. This private wildcard matching function would match IDN
(International Domain Name) hosts incorrectly and could as a result accept
patterns that otherwise should mismatch. IDN hostnames are converted to
puny code before used for certificate checks. Puny coded names always start
with `xn--` and should not be allowed to pattern match, but the wildcard
check in curl could still check for `x*`, which would match even though the
IDN name most likely contained nothing even resembling an `x`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28322&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An information disclosure vulnerability exists in curl &amp;lt;v8.1.0 when doing
HTTP(S) transfers, libcurl might erroneously use the read callback
(`CURLOPT_READFUNCTION`) to ask for data to send, even when the
`CURLOPT_POSTFIELDS` option has been set, if the same handle previously
was used to issue a `PUT` request which used that callback. This flaw may
surprise the application and cause it to misbehave and either send off the
wrong data or use memory after free or similar in the second transfer. The
problem exists in the logic for a reused handle when it is (expected to be)
changed from a PUT to a POST.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1068-2 curl regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1068-2-curl/</link>
      <pubDate>Mon, 09 Jun 2025 14:47:49 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1068-2-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1068-2-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.52.1-5&amp;#43;deb9u24 (stretch), 7.64.0-4&amp;#43;deb10u12 (buster)&lt;/p&gt;


      &lt;p&gt;The fix for CVE-2023-27534 in curl made the handling of tilde (~) way more
strict in sftp mode and caused a regression when trying to list the home dir
with sftp://host/~.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1454-1 twitter-bootstrap3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1454-1-twitter-bootstrap3/</link>
      <pubDate>Mon, 09 Jun 2025 15:03:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1454-1-twitter-bootstrap3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1454-1-twitter-bootstrap3/">
      
&lt;p&gt;Package : twitter-bootstrap3&lt;/p&gt;


&lt;p&gt;Version : 3.3.7&amp;#43;dfsg-2&amp;#43;deb9u3~deb8u2 (jessie), 3.3.7&amp;#43;dfsg-2&amp;#43;deb9u4 (stretch), 3.4.1&amp;#43;dfsg-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1647&#34;&gt;CVE-2025-1647&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A cross-site scripting (XSS) vulnerability
has been identified within the Bootstrap 3 Popover component and
Bootstrap 3 Tooltip component, which allows unsanitized HTML to be used.&lt;/p&gt;
&lt;p&gt;If you use bootstrap through a module bundler, you may need to rebuild your
application.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1453-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1453-1-modsecurity-apache/</link>
      <pubDate>Mon, 09 Jun 2025 16:02:51 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1453-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1453-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.8.0-3&amp;#43;deb8u4 (jessie), 2.9.1-2&amp;#43;deb9u4 (stretch), 2.9.3-3&amp;#43;deb11u4~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-48866&#34;&gt;CVE-2025-48866&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;DoS with sanitiseArg/sanitizeArg has been fixed in modsecurity-apache, a module for the Apache webserver to tighten Web application security.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1452-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1452-1-glibc/</link>
      <pubDate>Sun, 08 Jun 2025 09:40:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1452-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1452-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.28-10&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0395&#34;&gt;CVE-2025-0395&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4802&#34;&gt;CVE-2025-4802&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in the GNU C Library, the C standard
library implementation used by Debian.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-0395&#34;&gt;CVE-2024-0395&lt;/h3&gt;
&lt;p&gt;When the function fails, it does not allocate enough space for the assertion
failure message string and size information, which may lead to a buffer
overflow if the message string size aligns to page size.&lt;/p&gt;
&lt;h3 id=&#34;cve-2025-4802&#34;&gt;CVE-2025-4802&lt;/h3&gt;
&lt;p&gt;Privilege escalation may be possible in statically compiled setuid binaries
that call dlopen(), due to an untrusted LD_LIBRARY_PATH environment variable
vulnerability.  This includes calls to dlopen() internal to glibc itself, made
after user calls to setlocale() or to NSS functions such as getaddrinfo().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1451-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1451-1-glibc/</link>
      <pubDate>Sun, 08 Jun 2025 09:39:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1451-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1451-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.19-18&amp;#43;deb8u15 (jessie), 2.24-11&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0395&#34;&gt;CVE-2025-0395&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in the implementation of assert() in the GNU C Library, the C
standard library implementation used by Debian.  When the function fails, it
does not allocate enough space for the assertion failure message string and
size information, which may lead to a buffer overflow if the message string
size aligns to page size.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1448-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1448-1-python-django/</link>
      <pubDate>Sat, 07 Jun 2025 10:03:49 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1448-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1448-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u20 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32873&#34;&gt;CVE-2025-32873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24680&#34;&gt;CVE-2024-24680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36053&#34;&gt;CVE-2023-36053&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A number of vulnerabilities were discovered in Django, a popular Python-based
web development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32873: Prevent an issue where the &lt;code&gt;strip_tags()&lt;/code&gt; function in
&lt;code&gt;django.utils.html&lt;/code&gt; was vulnerable to a potential denial-of-service (DoS)
attack when processing inputs containing large sequences of incomplete HTML
tags. The template filter &lt;code&gt;|striptags&lt;/code&gt; was similarly vulnerable, as it is
built on top of &lt;code&gt;strip_tags()&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-24680: Prevent an issue where the &lt;code&gt;|intcomma&lt;/code&gt; template filter was
subject to a potential denial-of-service attack when used with very long
input strings.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-36053: Prevent an potential denial-of-service issue in the
&lt;code&gt;EmailValidator&lt;/code&gt; and &lt;code&gt;URLValidator&lt;/code&gt; classes that could have been exploited
via a very large number of domain name labels containing emails and/or
URLs.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1450-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1450-1-krb5/</link>
      <pubDate>Sat, 07 Jun 2025 10:48:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1450-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1450-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-19&amp;#43;deb8u11 (jessie), 1.15-1&amp;#43;deb9u8 (stretch), 1.17-3&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3576&#34;&gt;CVE-2025-3576&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability in the MIT Kerberos implementation
allows GSSAPI-protected messages using RC4-HMAC-MD5
to be spoofed due to weaknesses in the MD5 checksum design.
If RC4 is preferred over stronger encryption types,
an attacker could exploit MD5 collisions to forge message
integrity codes. This may lead to unauthorized
message tampering.&lt;/p&gt;
&lt;p&gt;In order to fix CVE-2025-3576, vulnerable cryptographic
algorithms for tickets need to be disabled explicitly
with the new allow_rc4 or allow_des3 variables.&lt;/p&gt;
&lt;p&gt;According to the vulnerability report &amp;ldquo;Kerberos’ RC4-HMAC broken in practice:
spoofing PACs with MD5 collisions&amp;rdquo;, disabling this cryptographic algorithm
suite may break some older authentication systems, and administrators should
test carefully.&lt;/p&gt;
&lt;p&gt;Because of the risk of breaking certain configurations, the
new allow_rc4 or allow_des3 are being treated as having a
default value of &amp;rsquo;true&amp;rsquo; for updates to older Debian releases.
This leaves the 3DES and RC4 algorithms enabled, but administrators
are strongly encouraged to disable them after verifying
compatibility in their environments.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1449-1 libfile-find-rule-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1449-1-libfile-find-rule-perl/</link>
      <pubDate>Fri, 06 Jun 2025 23:56:14 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1449-1-libfile-find-rule-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1449-1-libfile-find-rule-perl/">
      
&lt;p&gt;Package : libfile-find-rule-perl&lt;/p&gt;


&lt;p&gt;Version : 0.34-1&amp;#43;deb11u1~deb9u1 (stretch), 0.34-1&amp;#43;deb11u1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2011-10007&#34;&gt;CVE-2011-10007&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Arbitrary code execution with crafted file names was fixed in libfile-find-rule-perl, a module to search for files based on rules.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1447-1 net-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1447-1-net-tools/</link>
      <pubDate>Sat, 31 May 2025 23:58:20 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1447-1-net-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1447-1-net-tools/">
      
&lt;p&gt;Package : net-tools&lt;/p&gt;


&lt;p&gt;Version : 1.60-26&amp;#43;deb8u1 (jessie), 1.60&amp;#43;git20161116.90da8a0-1&amp;#43;deb9u1 (stretch), 1.60&amp;#43;git20180626.aebd88e-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46836&#34;&gt;CVE-2025-46836&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple stack-based buffer overflows have been fixed in the net-tools network utilities.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1446-1 libvpx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1446-1-libvpx/</link>
      <pubDate>Sat, 31 May 2025 23:49:38 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1446-1-libvpx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1446-1-libvpx/">
      
&lt;p&gt;Package : libvpx&lt;/p&gt;


&lt;p&gt;Version : 1.6.1-3&amp;#43;deb9u7 (stretch), 1.7.0-3&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5283&#34;&gt;CVE-2025-5283&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Double free on init failure has been fixed in libvpx, a library for decoding and encoding VP8 and VP9 videos.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1445-1 espeak-ng security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1445-1-espeak-ng/</link>
      <pubDate>Sat, 31 May 2025 10:55:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1445-1-espeak-ng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1445-1-espeak-ng/">
      
&lt;p&gt;Package : espeak-ng&lt;/p&gt;


&lt;p&gt;Version : 1.49.0&amp;#43;dfsg-11&amp;#43;deb9u1 (stretch), 1.49.2&amp;#43;dfsg-8&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49990&#34;&gt;CVE-2023-49990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49991&#34;&gt;CVE-2023-49991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49992&#34;&gt;CVE-2023-49992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49993&#34;&gt;CVE-2023-49993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49994&#34;&gt;CVE-2023-49994&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in espeak-ng, a Multi-lingual software
speech synthesizer.
The issues are related to buffer overflow or underflow in several
functions and a floating point exception.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1444-1 kmail-account-wizard security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1444-1-kmail-account-wizard/</link>
      <pubDate>Sat, 31 May 2025 01:12:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1444-1-kmail-account-wizard/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1444-1-kmail-account-wizard/">
      
&lt;p&gt;Package : kmail-account-wizard&lt;/p&gt;


&lt;p&gt;Version : 4:18.08.3-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15954&#34;&gt;CVE-2020-15954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50624&#34;&gt;CVE-2024-50624&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in kmail-account-wizard, a wizard for KDE PIM
applications account setup.&lt;/p&gt;
&lt;p&gt;One issue is about a man-in-the-middle-attack when using autoconf for
retrieving configuration. The other issue is about a misleading UI, in which
the state of encryption is shown wrong.&lt;/p&gt;
&lt;p&gt;Please also note that for configuration with autoconf.example.com, the
config is first fetched with https and the former http is used only as
fallback. For configuration via example.com/.well-known/autoconfig the
config is now fetched only with https.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1443-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1443-1-linux-6.1/</link>
      <pubDate>Fri, 30 May 2025 10:53:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1443-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1443-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.137-1~deb9u1 (stretch), 6.1.137-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52857&#34;&gt;CVE-2023-52857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52927&#34;&gt;CVE-2023-52927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-53034&#34;&gt;CVE-2023-53034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24855&#34;&gt;CVE-2024-24855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26656&#34;&gt;CVE-2024-26656&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26739&#34;&gt;CVE-2024-26739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26767&#34;&gt;CVE-2024-26767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26982&#34;&gt;CVE-2024-26982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27056&#34;&gt;CVE-2024-27056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35866&#34;&gt;CVE-2024-35866&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36908&#34;&gt;CVE-2024-36908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38541&#34;&gt;CVE-2024-38541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38611&#34;&gt;CVE-2024-38611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-40973&#34;&gt;CVE-2024-40973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42129&#34;&gt;CVE-2024-42129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43831&#34;&gt;CVE-2024-43831&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46733&#34;&gt;CVE-2024-46733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46742&#34;&gt;CVE-2024-46742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46753&#34;&gt;CVE-2024-46753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46772&#34;&gt;CVE-2024-46772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46774&#34;&gt;CVE-2024-46774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46816&#34;&gt;CVE-2024-46816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46823&#34;&gt;CVE-2024-46823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47753&#34;&gt;CVE-2024-47753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47754&#34;&gt;CVE-2024-47754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50056&#34;&gt;CVE-2024-50056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50063&#34;&gt;CVE-2024-50063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50246&#34;&gt;CVE-2024-50246&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53166&#34;&gt;CVE-2024-53166&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56609&#34;&gt;CVE-2024-56609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57977&#34;&gt;CVE-2024-57977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58002&#34;&gt;CVE-2024-58002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58005&#34;&gt;CVE-2024-58005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58079&#34;&gt;CVE-2024-58079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58090&#34;&gt;CVE-2024-58090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21702&#34;&gt;CVE-2025-21702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21712&#34;&gt;CVE-2025-21712&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21721&#34;&gt;CVE-2025-21721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21756&#34;&gt;CVE-2025-21756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21838&#34;&gt;CVE-2025-21838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21844&#34;&gt;CVE-2025-21844&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21846&#34;&gt;CVE-2025-21846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21848&#34;&gt;CVE-2025-21848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21853&#34;&gt;CVE-2025-21853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21855&#34;&gt;CVE-2025-21855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21858&#34;&gt;CVE-2025-21858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21859&#34;&gt;CVE-2025-21859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21862&#34;&gt;CVE-2025-21862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21864&#34;&gt;CVE-2025-21864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21865&#34;&gt;CVE-2025-21865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21866&#34;&gt;CVE-2025-21866&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21867&#34;&gt;CVE-2025-21867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21871&#34;&gt;CVE-2025-21871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21875&#34;&gt;CVE-2025-21875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21877&#34;&gt;CVE-2025-21877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21878&#34;&gt;CVE-2025-21878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21881&#34;&gt;CVE-2025-21881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21887&#34;&gt;CVE-2025-21887&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21891&#34;&gt;CVE-2025-21891&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21898&#34;&gt;CVE-2025-21898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21899&#34;&gt;CVE-2025-21899&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21904&#34;&gt;CVE-2025-21904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21905&#34;&gt;CVE-2025-21905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21909&#34;&gt;CVE-2025-21909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21910&#34;&gt;CVE-2025-21910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21912&#34;&gt;CVE-2025-21912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21913&#34;&gt;CVE-2025-21913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21914&#34;&gt;CVE-2025-21914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21916&#34;&gt;CVE-2025-21916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21917&#34;&gt;CVE-2025-21917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21918&#34;&gt;CVE-2025-21918&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21919&#34;&gt;CVE-2025-21919&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21920&#34;&gt;CVE-2025-21920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21922&#34;&gt;CVE-2025-21922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21924&#34;&gt;CVE-2025-21924&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21925&#34;&gt;CVE-2025-21925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21926&#34;&gt;CVE-2025-21926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21928&#34;&gt;CVE-2025-21928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21934&#34;&gt;CVE-2025-21934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21935&#34;&gt;CVE-2025-21935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21936&#34;&gt;CVE-2025-21936&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21937&#34;&gt;CVE-2025-21937&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21938&#34;&gt;CVE-2025-21938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21941&#34;&gt;CVE-2025-21941&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21943&#34;&gt;CVE-2025-21943&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21944&#34;&gt;CVE-2025-21944&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21945&#34;&gt;CVE-2025-21945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21947&#34;&gt;CVE-2025-21947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21948&#34;&gt;CVE-2025-21948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21950&#34;&gt;CVE-2025-21950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21951&#34;&gt;CVE-2025-21951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21956&#34;&gt;CVE-2025-21956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21957&#34;&gt;CVE-2025-21957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21959&#34;&gt;CVE-2025-21959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21960&#34;&gt;CVE-2025-21960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21962&#34;&gt;CVE-2025-21962&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21963&#34;&gt;CVE-2025-21963&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21964&#34;&gt;CVE-2025-21964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21968&#34;&gt;CVE-2025-21968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21970&#34;&gt;CVE-2025-21970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21971&#34;&gt;CVE-2025-21971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21975&#34;&gt;CVE-2025-21975&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21978&#34;&gt;CVE-2025-21978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21979&#34;&gt;CVE-2025-21979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21980&#34;&gt;CVE-2025-21980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21981&#34;&gt;CVE-2025-21981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21986&#34;&gt;CVE-2025-21986&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21991&#34;&gt;CVE-2025-21991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21992&#34;&gt;CVE-2025-21992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21993&#34;&gt;CVE-2025-21993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21994&#34;&gt;CVE-2025-21994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21996&#34;&gt;CVE-2025-21996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21997&#34;&gt;CVE-2025-21997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21999&#34;&gt;CVE-2025-21999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22004&#34;&gt;CVE-2025-22004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22005&#34;&gt;CVE-2025-22005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22007&#34;&gt;CVE-2025-22007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22008&#34;&gt;CVE-2025-22008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22010&#34;&gt;CVE-2025-22010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22014&#34;&gt;CVE-2025-22014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22015&#34;&gt;CVE-2025-22015&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22018&#34;&gt;CVE-2025-22018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22020&#34;&gt;CVE-2025-22020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22021&#34;&gt;CVE-2025-22021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22025&#34;&gt;CVE-2025-22025&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22027&#34;&gt;CVE-2025-22027&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22033&#34;&gt;CVE-2025-22033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22035&#34;&gt;CVE-2025-22035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22038&#34;&gt;CVE-2025-22038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22040&#34;&gt;CVE-2025-22040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22041&#34;&gt;CVE-2025-22041&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22042&#34;&gt;CVE-2025-22042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22044&#34;&gt;CVE-2025-22044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22045&#34;&gt;CVE-2025-22045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22049&#34;&gt;CVE-2025-22049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22050&#34;&gt;CVE-2025-22050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22054&#34;&gt;CVE-2025-22054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22055&#34;&gt;CVE-2025-22055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22056&#34;&gt;CVE-2025-22056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22058&#34;&gt;CVE-2025-22058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22060&#34;&gt;CVE-2025-22060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22063&#34;&gt;CVE-2025-22063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22066&#34;&gt;CVE-2025-22066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22071&#34;&gt;CVE-2025-22071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22072&#34;&gt;CVE-2025-22072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22073&#34;&gt;CVE-2025-22073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22075&#34;&gt;CVE-2025-22075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22079&#34;&gt;CVE-2025-22079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22081&#34;&gt;CVE-2025-22081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22086&#34;&gt;CVE-2025-22086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22088&#34;&gt;CVE-2025-22088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22089&#34;&gt;CVE-2025-22089&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22093&#34;&gt;CVE-2025-22093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22095&#34;&gt;CVE-2025-22095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22097&#34;&gt;CVE-2025-22097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22126&#34;&gt;CVE-2025-22126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23136&#34;&gt;CVE-2025-23136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23138&#34;&gt;CVE-2025-23138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23140&#34;&gt;CVE-2025-23140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23141&#34;&gt;CVE-2025-23141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23142&#34;&gt;CVE-2025-23142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23144&#34;&gt;CVE-2025-23144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23145&#34;&gt;CVE-2025-23145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23146&#34;&gt;CVE-2025-23146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23147&#34;&gt;CVE-2025-23147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23148&#34;&gt;CVE-2025-23148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23150&#34;&gt;CVE-2025-23150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23151&#34;&gt;CVE-2025-23151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23156&#34;&gt;CVE-2025-23156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23157&#34;&gt;CVE-2025-23157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23158&#34;&gt;CVE-2025-23158&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23159&#34;&gt;CVE-2025-23159&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23161&#34;&gt;CVE-2025-23161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23163&#34;&gt;CVE-2025-23163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37738&#34;&gt;CVE-2025-37738&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37739&#34;&gt;CVE-2025-37739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37740&#34;&gt;CVE-2025-37740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37741&#34;&gt;CVE-2025-37741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37742&#34;&gt;CVE-2025-37742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37748&#34;&gt;CVE-2025-37748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37749&#34;&gt;CVE-2025-37749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37752&#34;&gt;CVE-2025-37752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37756&#34;&gt;CVE-2025-37756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37757&#34;&gt;CVE-2025-37757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37758&#34;&gt;CVE-2025-37758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37765&#34;&gt;CVE-2025-37765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37766&#34;&gt;CVE-2025-37766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37767&#34;&gt;CVE-2025-37767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37768&#34;&gt;CVE-2025-37768&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37769&#34;&gt;CVE-2025-37769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37770&#34;&gt;CVE-2025-37770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37771&#34;&gt;CVE-2025-37771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37772&#34;&gt;CVE-2025-37772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37773&#34;&gt;CVE-2025-37773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37775&#34;&gt;CVE-2025-37775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37778&#34;&gt;CVE-2025-37778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37780&#34;&gt;CVE-2025-37780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37781&#34;&gt;CVE-2025-37781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37782&#34;&gt;CVE-2025-37782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37785&#34;&gt;CVE-2025-37785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37787&#34;&gt;CVE-2025-37787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37788&#34;&gt;CVE-2025-37788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37789&#34;&gt;CVE-2025-37789&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37790&#34;&gt;CVE-2025-37790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37792&#34;&gt;CVE-2025-37792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37794&#34;&gt;CVE-2025-37794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37796&#34;&gt;CVE-2025-37796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37797&#34;&gt;CVE-2025-37797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37798&#34;&gt;CVE-2025-37798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37801&#34;&gt;CVE-2025-37801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37803&#34;&gt;CVE-2025-37803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37805&#34;&gt;CVE-2025-37805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37808&#34;&gt;CVE-2025-37808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37810&#34;&gt;CVE-2025-37810&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37811&#34;&gt;CVE-2025-37811&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37812&#34;&gt;CVE-2025-37812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37815&#34;&gt;CVE-2025-37815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37817&#34;&gt;CVE-2025-37817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37818&#34;&gt;CVE-2025-37818&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37820&#34;&gt;CVE-2025-37820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37823&#34;&gt;CVE-2025-37823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37824&#34;&gt;CVE-2025-37824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37829&#34;&gt;CVE-2025-37829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37830&#34;&gt;CVE-2025-37830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37836&#34;&gt;CVE-2025-37836&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37838&#34;&gt;CVE-2025-37838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37839&#34;&gt;CVE-2025-37839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37840&#34;&gt;CVE-2025-37840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37841&#34;&gt;CVE-2025-37841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37844&#34;&gt;CVE-2025-37844&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37849&#34;&gt;CVE-2025-37849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37850&#34;&gt;CVE-2025-37850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37851&#34;&gt;CVE-2025-37851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37852&#34;&gt;CVE-2025-37852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37854&#34;&gt;CVE-2025-37854&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37857&#34;&gt;CVE-2025-37857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37858&#34;&gt;CVE-2025-37858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37859&#34;&gt;CVE-2025-37859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37862&#34;&gt;CVE-2025-37862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37865&#34;&gt;CVE-2025-37865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37867&#34;&gt;CVE-2025-37867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37871&#34;&gt;CVE-2025-37871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37875&#34;&gt;CVE-2025-37875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37879&#34;&gt;CVE-2025-37879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37881&#34;&gt;CVE-2025-37881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37883&#34;&gt;CVE-2025-37883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37884&#34;&gt;CVE-2025-37884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37885&#34;&gt;CVE-2025-37885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37889&#34;&gt;CVE-2025-37889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37892&#34;&gt;CVE-2025-37892&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37937&#34;&gt;CVE-2025-37937&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37938&#34;&gt;CVE-2025-37938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37940&#34;&gt;CVE-2025-37940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37979&#34;&gt;CVE-2025-37979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37982&#34;&gt;CVE-2025-37982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37983&#34;&gt;CVE-2025-37983&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37985&#34;&gt;CVE-2025-37985&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37989&#34;&gt;CVE-2025-37989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38152&#34;&gt;CVE-2025-38152&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38575&#34;&gt;CVE-2025-38575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38637&#34;&gt;CVE-2025-38637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39728&#34;&gt;CVE-2025-39728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39735&#34;&gt;CVE-2025-39735&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;This additionally includes many more bug fixes
from stable updates 6.1.130-6.1.137 and an update of the Microsoft
Azure Network Adapter (mana) driver.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1442-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1442-1-linux-5.10/</link>
      <pubDate>Fri, 30 May 2025 09:36:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1442-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1442-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.237-1~deb8u1 (jessie), 5.10.237-1~deb9u1 (stretch), 5.10.237-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47247&#34;&gt;CVE-2021-47247&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47489&#34;&gt;CVE-2021-47489&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48893&#34;&gt;CVE-2022-48893&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49046&#34;&gt;CVE-2022-49046&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49190&#34;&gt;CVE-2022-49190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49219&#34;&gt;CVE-2022-49219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49309&#34;&gt;CVE-2022-49309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49546&#34;&gt;CVE-2022-49546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49728&#34;&gt;CVE-2022-49728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52572&#34;&gt;CVE-2023-52572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52621&#34;&gt;CVE-2023-52621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52752&#34;&gt;CVE-2023-52752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52757&#34;&gt;CVE-2023-52757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-53034&#34;&gt;CVE-2023-53034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26686&#34;&gt;CVE-2024-26686&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26928&#34;&gt;CVE-2024-26928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26982&#34;&gt;CVE-2024-26982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35867&#34;&gt;CVE-2024-35867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35943&#34;&gt;CVE-2024-35943&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36908&#34;&gt;CVE-2024-36908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38611&#34;&gt;CVE-2024-38611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39494&#34;&gt;CVE-2024-39494&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41073&#34;&gt;CVE-2024-41073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42322&#34;&gt;CVE-2024-42322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44938&#34;&gt;CVE-2024-44938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46753&#34;&gt;CVE-2024-46753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46812&#34;&gt;CVE-2024-46812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46816&#34;&gt;CVE-2024-46816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46821&#34;&gt;CVE-2024-46821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47726&#34;&gt;CVE-2024-47726&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47730&#34;&gt;CVE-2024-47730&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49960&#34;&gt;CVE-2024-49960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50047&#34;&gt;CVE-2024-50047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50154&#34;&gt;CVE-2024-50154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50280&#34;&gt;CVE-2024-50280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53144&#34;&gt;CVE-2024-53144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-54458&#34;&gt;CVE-2024-54458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56599&#34;&gt;CVE-2024-56599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56608&#34;&gt;CVE-2024-56608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56658&#34;&gt;CVE-2024-56658&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56664&#34;&gt;CVE-2024-56664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57834&#34;&gt;CVE-2024-57834&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57973&#34;&gt;CVE-2024-57973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57977&#34;&gt;CVE-2024-57977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57979&#34;&gt;CVE-2024-57979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57980&#34;&gt;CVE-2024-57980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57981&#34;&gt;CVE-2024-57981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57986&#34;&gt;CVE-2024-57986&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58001&#34;&gt;CVE-2024-58001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58002&#34;&gt;CVE-2024-58002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58005&#34;&gt;CVE-2024-58005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58007&#34;&gt;CVE-2024-58007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58010&#34;&gt;CVE-2024-58010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58014&#34;&gt;CVE-2024-58014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58016&#34;&gt;CVE-2024-58016&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58017&#34;&gt;CVE-2024-58017&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58020&#34;&gt;CVE-2024-58020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58051&#34;&gt;CVE-2024-58051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58052&#34;&gt;CVE-2024-58052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58055&#34;&gt;CVE-2024-58055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58058&#34;&gt;CVE-2024-58058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58063&#34;&gt;CVE-2024-58063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58069&#34;&gt;CVE-2024-58069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58071&#34;&gt;CVE-2024-58071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58072&#34;&gt;CVE-2024-58072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58083&#34;&gt;CVE-2024-58083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58085&#34;&gt;CVE-2024-58085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58090&#34;&gt;CVE-2024-58090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21647&#34;&gt;CVE-2025-21647&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21700&#34;&gt;CVE-2025-21700&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21702&#34;&gt;CVE-2025-21702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21704&#34;&gt;CVE-2025-21704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21708&#34;&gt;CVE-2025-21708&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21711&#34;&gt;CVE-2025-21711&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21715&#34;&gt;CVE-2025-21715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21718&#34;&gt;CVE-2025-21718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21719&#34;&gt;CVE-2025-21719&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21721&#34;&gt;CVE-2025-21721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21722&#34;&gt;CVE-2025-21722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21726&#34;&gt;CVE-2025-21726&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21727&#34;&gt;CVE-2025-21727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21728&#34;&gt;CVE-2025-21728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21731&#34;&gt;CVE-2025-21731&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21735&#34;&gt;CVE-2025-21735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21736&#34;&gt;CVE-2025-21736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21744&#34;&gt;CVE-2025-21744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21745&#34;&gt;CVE-2025-21745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21749&#34;&gt;CVE-2025-21749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21753&#34;&gt;CVE-2025-21753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21756&#34;&gt;CVE-2025-21756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21760&#34;&gt;CVE-2025-21760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21761&#34;&gt;CVE-2025-21761&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21762&#34;&gt;CVE-2025-21762&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21763&#34;&gt;CVE-2025-21763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21764&#34;&gt;CVE-2025-21764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21765&#34;&gt;CVE-2025-21765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21767&#34;&gt;CVE-2025-21767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21772&#34;&gt;CVE-2025-21772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21776&#34;&gt;CVE-2025-21776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21779&#34;&gt;CVE-2025-21779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21781&#34;&gt;CVE-2025-21781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21782&#34;&gt;CVE-2025-21782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21785&#34;&gt;CVE-2025-21785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21787&#34;&gt;CVE-2025-21787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21791&#34;&gt;CVE-2025-21791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21795&#34;&gt;CVE-2025-21795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21796&#34;&gt;CVE-2025-21796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21799&#34;&gt;CVE-2025-21799&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21802&#34;&gt;CVE-2025-21802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21804&#34;&gt;CVE-2025-21804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21806&#34;&gt;CVE-2025-21806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21811&#34;&gt;CVE-2025-21811&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21814&#34;&gt;CVE-2025-21814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21823&#34;&gt;CVE-2025-21823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21826&#34;&gt;CVE-2025-21826&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21835&#34;&gt;CVE-2025-21835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21844&#34;&gt;CVE-2025-21844&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21846&#34;&gt;CVE-2025-21846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21848&#34;&gt;CVE-2025-21848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21853&#34;&gt;CVE-2025-21853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21858&#34;&gt;CVE-2025-21858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21859&#34;&gt;CVE-2025-21859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21862&#34;&gt;CVE-2025-21862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21871&#34;&gt;CVE-2025-21871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21872&#34;&gt;CVE-2025-21872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21875&#34;&gt;CVE-2025-21875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21877&#34;&gt;CVE-2025-21877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21878&#34;&gt;CVE-2025-21878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21898&#34;&gt;CVE-2025-21898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21904&#34;&gt;CVE-2025-21904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21905&#34;&gt;CVE-2025-21905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21909&#34;&gt;CVE-2025-21909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21910&#34;&gt;CVE-2025-21910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21914&#34;&gt;CVE-2025-21914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21916&#34;&gt;CVE-2025-21916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21917&#34;&gt;CVE-2025-21917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21920&#34;&gt;CVE-2025-21920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21922&#34;&gt;CVE-2025-21922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21925&#34;&gt;CVE-2025-21925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21926&#34;&gt;CVE-2025-21926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21928&#34;&gt;CVE-2025-21928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21934&#34;&gt;CVE-2025-21934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21935&#34;&gt;CVE-2025-21935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21941&#34;&gt;CVE-2025-21941&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21943&#34;&gt;CVE-2025-21943&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21948&#34;&gt;CVE-2025-21948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21956&#34;&gt;CVE-2025-21956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21957&#34;&gt;CVE-2025-21957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21959&#34;&gt;CVE-2025-21959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21968&#34;&gt;CVE-2025-21968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21971&#34;&gt;CVE-2025-21971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21975&#34;&gt;CVE-2025-21975&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21981&#34;&gt;CVE-2025-21981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21991&#34;&gt;CVE-2025-21991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21992&#34;&gt;CVE-2025-21992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21993&#34;&gt;CVE-2025-21993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21996&#34;&gt;CVE-2025-21996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21999&#34;&gt;CVE-2025-21999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22004&#34;&gt;CVE-2025-22004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22005&#34;&gt;CVE-2025-22005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22007&#34;&gt;CVE-2025-22007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22008&#34;&gt;CVE-2025-22008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22010&#34;&gt;CVE-2025-22010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22014&#34;&gt;CVE-2025-22014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22018&#34;&gt;CVE-2025-22018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22020&#34;&gt;CVE-2025-22020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22021&#34;&gt;CVE-2025-22021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22025&#34;&gt;CVE-2025-22025&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22027&#34;&gt;CVE-2025-22027&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22035&#34;&gt;CVE-2025-22035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22044&#34;&gt;CVE-2025-22044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22045&#34;&gt;CVE-2025-22045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22054&#34;&gt;CVE-2025-22054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22055&#34;&gt;CVE-2025-22055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22056&#34;&gt;CVE-2025-22056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22063&#34;&gt;CVE-2025-22063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22075&#34;&gt;CVE-2025-22075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22079&#34;&gt;CVE-2025-22079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22086&#34;&gt;CVE-2025-22086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23136&#34;&gt;CVE-2025-23136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23138&#34;&gt;CVE-2025-23138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23140&#34;&gt;CVE-2025-23140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23142&#34;&gt;CVE-2025-23142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23144&#34;&gt;CVE-2025-23144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23145&#34;&gt;CVE-2025-23145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23146&#34;&gt;CVE-2025-23146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23147&#34;&gt;CVE-2025-23147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23148&#34;&gt;CVE-2025-23148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23150&#34;&gt;CVE-2025-23150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23156&#34;&gt;CVE-2025-23156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23157&#34;&gt;CVE-2025-23157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23158&#34;&gt;CVE-2025-23158&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23159&#34;&gt;CVE-2025-23159&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23163&#34;&gt;CVE-2025-23163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37738&#34;&gt;CVE-2025-37738&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37739&#34;&gt;CVE-2025-37739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37740&#34;&gt;CVE-2025-37740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37741&#34;&gt;CVE-2025-37741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37749&#34;&gt;CVE-2025-37749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37756&#34;&gt;CVE-2025-37756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37757&#34;&gt;CVE-2025-37757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37765&#34;&gt;CVE-2025-37765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37766&#34;&gt;CVE-2025-37766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37768&#34;&gt;CVE-2025-37768&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37770&#34;&gt;CVE-2025-37770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37773&#34;&gt;CVE-2025-37773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37780&#34;&gt;CVE-2025-37780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37781&#34;&gt;CVE-2025-37781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37782&#34;&gt;CVE-2025-37782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37785&#34;&gt;CVE-2025-37785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37788&#34;&gt;CVE-2025-37788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37789&#34;&gt;CVE-2025-37789&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37792&#34;&gt;CVE-2025-37792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37794&#34;&gt;CVE-2025-37794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37796&#34;&gt;CVE-2025-37796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37797&#34;&gt;CVE-2025-37797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37803&#34;&gt;CVE-2025-37803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37808&#34;&gt;CVE-2025-37808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37810&#34;&gt;CVE-2025-37810&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37812&#34;&gt;CVE-2025-37812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37817&#34;&gt;CVE-2025-37817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37823&#34;&gt;CVE-2025-37823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37824&#34;&gt;CVE-2025-37824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37829&#34;&gt;CVE-2025-37829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37836&#34;&gt;CVE-2025-37836&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37838&#34;&gt;CVE-2025-37838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37839&#34;&gt;CVE-2025-37839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37840&#34;&gt;CVE-2025-37840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37841&#34;&gt;CVE-2025-37841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37844&#34;&gt;CVE-2025-37844&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37850&#34;&gt;CVE-2025-37850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37851&#34;&gt;CVE-2025-37851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37857&#34;&gt;CVE-2025-37857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37858&#34;&gt;CVE-2025-37858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37859&#34;&gt;CVE-2025-37859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37862&#34;&gt;CVE-2025-37862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37867&#34;&gt;CVE-2025-37867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37871&#34;&gt;CVE-2025-37871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37881&#34;&gt;CVE-2025-37881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-37885&#34;&gt;CVE-2025-37885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-38637&#34;&gt;CVE-2025-38637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39728&#34;&gt;CVE-2025-39728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-39735&#34;&gt;CVE-2025-39735&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;This additionally includes many more bug fixes from
stable updates 5.10.235-5.10.237.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1441-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1441-1-modsecurity-apache/</link>
      <pubDate>Thu, 29 May 2025 23:56:19 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1441-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1441-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.8.0-3&amp;#43;deb8u3 (jessie), 2.9.1-2&amp;#43;deb9u3 (stretch), 2.9.3-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47947&#34;&gt;CVE-2025-47947&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;DoS with sanitiseMatchedBytes has been fixed in modsecurity-apache, a module for the Apache webserver to tighten Web application security.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1440-1 webpy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1440-1-webpy/</link>
      <pubDate>Thu, 29 May 2025 14:28:13 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1440-1-webpy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1440-1-webpy/">
      
&lt;p&gt;Package : webpy&lt;/p&gt;


&lt;p&gt;Version : 1:0.38-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3818&#34;&gt;CVE-2025-3818&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PostgreSQL SQL injection has been fixed in web.py, a Web framework for Python applications.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1438-1 yelp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1438-1-yelp/</link>
      <pubDate>Wed, 28 May 2025 17:32:20 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1438-1-yelp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1438-1-yelp/">
      
&lt;p&gt;Package : yelp&lt;/p&gt;


&lt;p&gt;Version : 3.22.0-1&amp;#43;deb9u1 (stretch), 3.31.90-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3155&#34;&gt;CVE-2025-3155&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in Yelp. The Gnome user help application allows the help
document to execute arbitrary scripts. This vulnerability allows malicious
users to input help documents, which may exfiltrate user files to an external
environment.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1439-1 yelp-xsl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1439-1-yelp-xsl/</link>
      <pubDate>Wed, 28 May 2025 17:31:33 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1439-1-yelp-xsl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1439-1-yelp-xsl/">
      
&lt;p&gt;Package : yelp-xsl&lt;/p&gt;


&lt;p&gt;Version : 3.20.1-2&amp;#43;deb9u1 (stretch), 3.31.90-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3155&#34;&gt;CVE-2025-3155&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in Yelp. The Gnome user help application allows the help
document to execute arbitrary scripts. This vulnerability allows malicious
users to input help documents, which may exfiltrate user files to an external
environment.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1437-1 libbson security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1437-1-libbson/</link>
      <pubDate>Mon, 26 May 2025 17:08:23 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1437-1-libbson/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1437-1-libbson/">
      
&lt;p&gt;Package : libbson&lt;/p&gt;


&lt;p&gt;Version : 1.4.2-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14227&#34;&gt;CVE-2017-14227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16790&#34;&gt;CVE-2018-16790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0437&#34;&gt;CVE-2023-0437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6381&#34;&gt;CVE-2024-6381&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6383&#34;&gt;CVE-2024-6383&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0755&#34;&gt;CVE-2025-0755&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in the MongoDB BSON library.&lt;/p&gt;
&lt;p&gt;CVE-2017-14227&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The bson_iter_codewscope function in bson-iter.c miscalculates a
bson_utf8_validate length argument, which allows remote attackers to
cause a denial of service (heap-based buffer over-read in the
bson_utf8_validate function in bson-utf8.c).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-16790&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;_bson_iter_next_internal in bson-iter.c has a heap-based buffer
over-read via a crafted bson buffer.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0437&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When calling bson_utf8_validate on some inputs a loop with an exit
condition that cannot be reached may occur, i.e. an infinite loop.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6381&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The bson_strfreev function in the MongoDB C driver library may be
susceptible to an integer overflow where the function will try to
free memory at a negative offset. This may result in memory
corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6383&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The bson_string_append function in MongoDB C Driver may be
vulnerable to a buffer overflow where the function might attempt to
allocate too small of buffer and may lead to memory corruption of
neighbouring heap memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-0755&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The various bson_append functions in the MongoDB C driver library
may be susceptible to buffer overflow when performing operations
that could result in a final BSON document which exceeds the maximum
allowable size (INT32_MAX), resulting in a segmentation fault and
possible application crash.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1435-1 libfcgi-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1435-1-libfcgi-perl/</link>
      <pubDate>Mon, 26 May 2025 23:00:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1435-1-libfcgi-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1435-1-libfcgi-perl/">
      
&lt;p&gt;Package : libfcgi-perl&lt;/p&gt;


&lt;p&gt;Version : 0.77-1&amp;#43;deb8u2 (jessie), 0.78-2&amp;#43;deb9u1 (stretch), 0.78-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-40907&#34;&gt;CVE-2025-40907&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;libfcgi-perl is a helper module for FastCGI, a binary protocol for interfacing
interactive programs with a web server. It was found the included FastCGI
library is affected by CVE-2025-23016, causing an integer overflow (and
resultant heap-based buffer overflow) via crafted nameLen or valueLen values in
data to the IPC socket which may lead to a denial of service or other
unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1434-1 subversion security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1434-1-subversion/</link>
      <pubDate>Mon, 26 May 2025 22:49:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1434-1-subversion/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1434-1-subversion/">
      
&lt;p&gt;Package : subversion&lt;/p&gt;


&lt;p&gt;Version : 1.8.10-6&amp;#43;deb8u10 (jessie), 1.9.5-1&amp;#43;deb9u7 (stretch), 1.10.4-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46901&#34;&gt;CVE-2024-46901&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw has been discovered in subversion, an advanced version control system.
The patch for CVE-2013-1968 was incomplete and unintentionally left mod_dav_svn
vulnerable to control characters in filenames.  If a path or a
revision-property which contains control characters is committed to a
repository then SVN operations served by mod_dav_svn can be disrupted.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1433-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1433-1-glib2.0/</link>
      <pubDate>Mon, 26 May 2025 22:23:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1433-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1433-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.42.1-1&amp;#43;deb8u9 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-4373&#34;&gt;CVE-2025-4373&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in GLib, a bundle of low-level system libraries, which is
vulnerable to an integer overflow in the g_string_insert_unichar() function.
When the position at which to insert the character is large, the position will
overflow, leading to a buffer underwrite.&lt;/p&gt;
&lt;p&gt;Additionally this update addresses a regression introduced in ELA-625-1 in
order to fix CVE-2021-27218. The inline keyword in the gmem.h header file was
not defined if software used an older C standard which led to a build failure
when building reverse-dependencies of GLib, e.g. subversion.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1436-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1436-1-gimp/</link>
      <pubDate>Mon, 26 May 2025 15:53:36 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1436-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1436-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u4 (stretch), 2.10.8-2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-5473&#34;&gt;CVE-2025-5473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;ICO file parsing integer overflow has been fixed in GIMP, the GNU Image Manipulation Program.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1432-1 libphp-adodb security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1432-1-libphp-adodb/</link>
      <pubDate>Sat, 24 May 2025 23:52:15 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1432-1-libphp-adodb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1432-1-libphp-adodb/">
      
&lt;p&gt;Package : libphp-adodb&lt;/p&gt;


&lt;p&gt;Version : 5.20.14-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-46337&#34;&gt;CVE-2025-46337&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;SQL injection in the PostgreSQL driver has been fixed in the ADOdb database access library for PHP.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1431-1 mongo-c-driver security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1431-1-mongo-c-driver/</link>
      <pubDate>Wed, 21 May 2025 09:58:35 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1431-1-mongo-c-driver/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1431-1-mongo-c-driver/">
      
&lt;p&gt;Package : mongo-c-driver&lt;/p&gt;


&lt;p&gt;Version : 1.14.0-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32050&#34;&gt;CVE-2021-32050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0437&#34;&gt;CVE-2023-0437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6381&#34;&gt;CVE-2024-6381&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6383&#34;&gt;CVE-2024-6383&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0755&#34;&gt;CVE-2025-0755&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in the MongoDB C Driver.&lt;/p&gt;
&lt;p&gt;CVE-2021-32050&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Some MongoDB Drivers may erroneously publish events containing
authentication-related data to a command listener configured by an
application. The published events may contain security-sensitive
data when specific authentication-related commands are executed.
Without due care, an application may inadvertently expose this
sensitive information, e.g., by writing it to a log file. This issue
only arises if an application enables the command listener feature
(this is not enabled by default).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0437&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When calling bson_utf8_validate on some inputs a loop with an exit
condition that cannot be reached may occur, i.e. an infinite loop.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6381&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The bson_strfreev function in the MongoDB C driver library may be
susceptible to an integer overflow where the function will try to
free memory at a negative offset. This may result in memory
corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6383&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The bson_string_append function in MongoDB C Driver may be
vulnerable to a buffer overflow where the function might attempt to
allocate too small of buffer and may lead to memory corruption of
neighbouring heap memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-0755&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The various bson_append functions in the MongoDB C driver library
may be susceptible to buffer overflow when performing operations
that could result in a final BSON document which exceeds the maximum
allowable size (INT32_MAX), resulting in a segmentation fault and
possible application crash.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1430-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1430-1-vim/</link>
      <pubDate>Wed, 21 May 2025 10:31:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1430-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1430-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u12 (jessie), 2:8.0.0197-4&amp;#43;deb9u12 (stretch), 2:8.1.0875-5&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4738&#34;&gt;CVE-2023-4738&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5344&#34;&gt;CVE-2023-5344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22667&#34;&gt;CVE-2024-22667&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43802&#34;&gt;CVE-2024-43802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47814&#34;&gt;CVE-2024-47814&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the editor vim.&lt;/p&gt;
&lt;p&gt;CVE-2023-4738&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;buffer-overflow in vim_regsub_both()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5344&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;buffer-overflow in trunc_string()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22667&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;stack-buffer-overflow in option callback functions
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43802&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;heap-buffer-overflow in ins_typebuf()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47814&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;use-after-free when closing a buffer
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1429-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1429-1-openjdk-8/</link>
      <pubDate>Tue, 20 May 2025 12:26:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1429-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1429-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u452-ga-1~deb8u1 (jessie), 8u452-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21587&#34;&gt;CVE-2025-21587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30691&#34;&gt;CVE-2025-30691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30698&#34;&gt;CVE-2025-30698&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in denial of service, information disclosure
or bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1428-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1428-1-openjdk-11/</link>
      <pubDate>Tue, 20 May 2025 10:37:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1428-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1428-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.27&amp;#43;6-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21587&#34;&gt;CVE-2025-21587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30691&#34;&gt;CVE-2025-30691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30698&#34;&gt;CVE-2025-30698&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in denial of service, information disclosure
or bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1427-1 open-vm-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1427-1-open-vm-tools/</link>
      <pubDate>Mon, 19 May 2025 15:33:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1427-1-open-vm-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1427-1-open-vm-tools/">
      
&lt;p&gt;Package : open-vm-tools&lt;/p&gt;


&lt;p&gt;Version : 2:10.1.5-5055683-4&amp;#43;deb9u7 (stretch), 2:10.3.10-1&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22247&#34;&gt;CVE-2025-22247&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that insecure file handling in open-vm-tools, an open
source implementation of VMware Tools, may allow an unprivileged local
guest user to tamper local files to trigger insecure file operations
within that VM.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1426-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1426-1-ghostscript/</link>
      <pubDate>Mon, 19 May 2025 00:49:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1426-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1426-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u15 (jessie), 9.26a~dfsg-0&amp;#43;deb9u14 (stretch), 9.27~dfsg-2&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27830&#34;&gt;CVE-2025-27830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27831&#34;&gt;CVE-2025-27831&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27832&#34;&gt;CVE-2025-27832&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27835&#34;&gt;CVE-2025-27835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27836&#34;&gt;CVE-2025-27836&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities affected ghostscript an interpreter for PostScript and Portable Document Format (PDF)
page description languages.&lt;/p&gt;
&lt;p&gt;CVE-2025-27830&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow via serialization of DollarBlend
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27831&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unicode decoding overrun
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27832&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow leading to buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27835&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Confusion between bytes and shorts
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27836&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in bj10v device
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1425-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1425-1-intel-microcode/</link>
      <pubDate>Sun, 18 May 2025 19:23:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1425-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1425-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20250512.1~deb8u1 (jessie), 3.20250512.1~deb9u1 (stretch), 3.20250512.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28956&#34;&gt;CVE-2024-28956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43420&#34;&gt;CVE-2024-43420&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45332&#34;&gt;CVE-2024-45332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20012&#34;&gt;CVE-2025-20012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20054&#34;&gt;CVE-2025-20054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20103&#34;&gt;CVE-2025-20103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-20623&#34;&gt;CVE-2025-20623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24495&#34;&gt;CVE-2025-24495&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Microcode updates have been released for Intel(R) processors, addressing
multiple potential vulnerabilties that may allow denial of service or
information disclosure.&lt;/p&gt;
&lt;p&gt;CVE-2024-28956&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exposure of Sensitive Information in Shared Microarchitectural
Structures during Transient Execution for some Intel(R) Processors
may allow an authenticated user to potentially enable information
disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43420&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exposure of sensitive information caused by shared
microarchitectural predictor state that influences transient
execution for some Intel Atom(R) processors may allow an
authenticated user to potentially enable information disclosure via
local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-45332&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exposure of sensitive information caused by shared
microarchitectural predictor state that influences transient
execution in the indirect branch predictors for some Intel(R)
Processors may allow an authenticated user to potentially enable
information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-20012&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect behavior order for some Intel(R) Core™ Ultra Processors
may allow an unauthenticated user to potentially enable information
disclosure via physical access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-20054&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Uncaught exception in the core management mechanism for some
Intel(R) Processors may allow an authenticated user to potentially
enable denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-20103&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient resource pool in the core management mechanism for some
Intel(R) Processors may allow an authenticated user to potentially
enable denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-20623&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exposure of sensitive information caused by shared
microarchitectural predictor state that influences transient
execution for some Intel(R) Core™ processors (10th Generation) may
allow an authenticated user to potentially enable information
disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-24495&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect initialization of resource in the branch prediction unit
for some Intel(R) Core™ Ultra Processors may allow an authenticated
user to potentially enable information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1424-1 libraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1424-1-libraw/</link>
      <pubDate>Sun, 18 May 2025 14:43:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1424-1-libraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1424-1-libraw/">
      
&lt;p&gt;Package : libraw&lt;/p&gt;


&lt;p&gt;Version : 0.17.2-6&amp;#43;deb9u6 (stretch), 0.19.2-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-43961&#34;&gt;CVE-2025-43961&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-43962&#34;&gt;CVE-2025-43962&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-43963&#34;&gt;CVE-2025-43963&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-43964&#34;&gt;CVE-2025-43964&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-43961&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Out-of-bounds read in the Fujifilm &lt;code&gt;0xf00c&lt;/code&gt; tag parser.  (This issue
did not affect 0.17.2-6+deb9u5 and earlier versions.)&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-43962&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Out-of-bounds reads for tag &lt;code&gt;0x412&lt;/code&gt; processing, related to large
&lt;code&gt;w0&lt;/code&gt; or &lt;code&gt;w1&lt;/code&gt; values or the &lt;code&gt;frac&lt;/code&gt; and &lt;code&gt;mult&lt;/code&gt; calculations.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-43963&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;&lt;code&gt;phase_one_correct()&lt;/code&gt; allows out-of-buffer access because
&lt;code&gt;split_col&lt;/code&gt; and &lt;code&gt;split_row&lt;/code&gt; values are not checked in &lt;code&gt;0x041f&lt;/code&gt; tag
processing.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-43964&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tag &lt;code&gt;0x412&lt;/code&gt; processing in &lt;code&gt;phase_one_correct()&lt;/code&gt; does not enforce
minimum &lt;code&gt;w0&lt;/code&gt; and &lt;code&gt;w1&lt;/code&gt; values.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1423-1 dropbear security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1423-1-dropbear/</link>
      <pubDate>Sun, 18 May 2025 08:59:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1423-1-dropbear/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1423-1-dropbear/">
      
&lt;p&gt;Package : dropbear&lt;/p&gt;


&lt;p&gt;Version : 2018.76-5&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47203&#34;&gt;CVE-2025-47203&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Marcin Nowak discovered that &lt;a href=&#34;https://manpages.debian.org/dbclient.1.en.html&#34;&gt;dbclient(1)&lt;/a&gt; hostname arguments with a
comma (for multihop) are passed to the shell which could result in
running arbitrary shell commands locally.  Such behavior could have
security implications in situations where &lt;a href=&#34;https://manpages.debian.org/dbclient.1.en.html&#34;&gt;dbclient(1)&lt;/a&gt; is passed
untrusted hostname arguments.&lt;/p&gt;
&lt;p&gt;The multihop command is now executed directly (no shell is involved).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1422-1 simplesamlphp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1422-1-simplesamlphp/</link>
      <pubDate>Sat, 17 May 2025 10:22:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1422-1-simplesamlphp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1422-1-simplesamlphp/">
      
&lt;p&gt;Package : simplesamlphp&lt;/p&gt;


&lt;p&gt;Version : 1.16.3-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-5225&#34;&gt;CVE-2020-5225&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27773&#34;&gt;CVE-2025-27773&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilites have been discovered in SimpleSAMLphp, a framework for
authentication, primarily via the SAML protocol.&lt;/p&gt;
&lt;p&gt;CVE-2020-5225&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27773&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. Prior to versions 4.17.0 and 5.0.0-alpha.20, there is a signature confusion attack in the HTTPRedirect binding. An attacker with any signed SAMLResponse via the HTTP-Redirect binding can cause the application to accept an unsigned message. Versions 4.17.0 and 5.0.0-alpha.20 contain a fix for the issue.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1421-1 vips security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1421-1-vips/</link>
      <pubDate>Fri, 16 May 2025 13:24:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1421-1-vips/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1421-1-vips/">
      
&lt;p&gt;Package : vips&lt;/p&gt;


&lt;p&gt;Version : 8.7.4-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27847&#34;&gt;CVE-2021-27847&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Division by zero issues were discovered in &lt;code&gt;vips_eye_point()&lt;/code&gt; and
&lt;code&gt;vips_mask_point()&lt;/code&gt;, potentially leading to denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1420-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1420-1-redis/</link>
      <pubDate>Mon, 12 May 2025 16:24:47 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1420-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1420-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u15 (jessie), 3:3.2.6-3&amp;#43;deb9u15 (stretch), 5:5.0.14-1&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21605&#34;&gt;CVE-2025-21605&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Unlimited output buffer for unauthenticated clients has been fixed in the key–value database Redis.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1419-1 wpa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1419-1-wpa/</link>
      <pubDate>Sun, 11 May 2025 11:25:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1419-1-wpa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1419-1-wpa/">
      
&lt;p&gt;Package : wpa&lt;/p&gt;


&lt;p&gt;Version : 2:2.9.0-21&amp;#43;deb11u3~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23303&#34;&gt;CVE-2022-23303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23304&#34;&gt;CVE-2022-23304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37660&#34;&gt;CVE-2022-37660&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in wpa, a set of tools including
the widely-used wpasupplicant client for authenticating with WPA
and WPA2 wireless networks.&lt;/p&gt;
&lt;p&gt;CVE-2022-23303&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The implementations of SAE in hostapd
are vulnerable to side channel attacks as a result of
cache access patterns.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23304&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The implementations of EAP-pwd are vulnerable
to side-channel attacks as a result of cache access patterns.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-37660&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The PKEX code remains active even after
a successful PKEX association. An attacker that successfully
bootstrapped public keys with another entity using PKEX in
the past, will be able to subvert a future bootstrapping
by passively observing public keys.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1418-1 request-tracker4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1418-1-request-tracker4/</link>
      <pubDate>Thu, 08 May 2025 12:59:14 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1418-1-request-tracker4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1418-1-request-tracker4/">
      
&lt;p&gt;Package : request-tracker4&lt;/p&gt;


&lt;p&gt;Version : 4.4.3-2&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3262&#34;&gt;CVE-2024-3262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2545&#34;&gt;CVE-2025-2545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30087&#34;&gt;CVE-2025-30087&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system, which could result in
information disclosure, cross-site scripting and use of weak encryption
for S/MIME emails.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1417-1 golang-glog security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1417-1-golang-glog/</link>
      <pubDate>Mon, 05 May 2025 15:32:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1417-1-golang-glog/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1417-1-golang-glog/">
      
&lt;p&gt;Package : golang-glog&lt;/p&gt;


&lt;p&gt;Version : 0.0~git20160126.23def4e-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45339&#34;&gt;CVE-2024-45339&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;When logs are written to a widely-writable directory (the default), an
unprivileged attacker may predict a privileged process&amp;rsquo;s log file path
and pre-create a symbolic link to a sensitive file in its place. When
that privileged process runs, it will follow the planted symlink and
overwrite that sensitive file. To fix that, glog now causes the program
to exit (with status code 2) when it finds that the configured log file
already exists.&lt;/p&gt;
&lt;p&gt;The following Go packages have been rebuilt in order to fix this
issue:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;golang-grpc-gateway&lt;/code&gt; 1.6.4-2+deb10u1&lt;/li&gt;
&lt;li&gt;&lt;code&gt;mtail&lt;/code&gt; 3.0.0~rc19-2+deb10u1&lt;/li&gt;
&lt;li&gt;&lt;code&gt;prometheus-mongodb-exporter&lt;/code&gt; 1.0.0+git20180522.e755a44-1+deb10u1&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1416-1 libuv1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1416-1-libuv1/</link>
      <pubDate>Sun, 04 May 2025 19:08:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1416-1-libuv1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1416-1-libuv1/">
      
&lt;p&gt;Package : libuv1&lt;/p&gt;


&lt;p&gt;Version : 1.24.1-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8252&#34;&gt;CVE-2020-8252&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;realpath in libuv incorrectly determined the buffer size which
can result in a buffer overflow if the resolved path is
longer than 256 bytes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1415-1 nodejs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1415-1-nodejs/</link>
      <pubDate>Sun, 04 May 2025 00:41:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1415-1-nodejs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1415-1-nodejs/">
      
&lt;p&gt;Package : nodejs&lt;/p&gt;


&lt;p&gt;Version : 10.24.0~dfsg-1~deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-47153&#34;&gt;CVE-2025-47153&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Node.js a popular server side javascript engine was affected by
a vulnerability on 32bits architecture.&lt;/p&gt;
&lt;p&gt;Build processes for libuv and Node.js for 32-bit systems,
have an inconsistent off_t size (e.g., building on i386 Debian always uses
_FILE_OFFSET_BITS=64 for the libuv dynamic library,
but uses the _FILE_OFFSET_BITS global system default of 32 for nodejs),
leading to out-of-bounds access.&lt;/p&gt;
&lt;p&gt;Following reverse dependencies were also rebuilt in order to fix the
vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;node-expat&lt;/li&gt;
&lt;li&gt;node-iconv&lt;/li&gt;
&lt;li&gt;node-leveldown&lt;/li&gt;
&lt;li&gt;node-mapnik&lt;/li&gt;
&lt;li&gt;node-modern-syslog&lt;/li&gt;
&lt;li&gt;node-nodedbi&lt;/li&gt;
&lt;li&gt;node-opencv&lt;/li&gt;
&lt;li&gt;node-sqlite3&lt;/li&gt;
&lt;li&gt;node-srs&lt;/li&gt;
&lt;li&gt;node-stringprep&lt;/li&gt;
&lt;li&gt;node-websocket&lt;/li&gt;
&lt;li&gt;node-ws&lt;/li&gt;
&lt;li&gt;node-zipfile&lt;/li&gt;
&lt;li&gt;r-cran-v8&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1414-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1414-1-postgresql-9.6/</link>
      <pubDate>Fri, 02 May 2025 08:58:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1414-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1414-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1094&#34;&gt;CVE-2025-1094&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PostgreSQL, a popular database, was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;Improper neutralization of quoting syntax in PostgreSQL libpq functions
PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and
PQescapeStringConn() allows a database input provider to achieve
SQL injection in certain usage patterns.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1413-1 mysql-connector-python security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1413-1-mysql-connector-python/</link>
      <pubDate>Fri, 02 May 2025 00:00:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1413-1-mysql-connector-python/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1413-1-mysql-connector-python/">
      
&lt;p&gt;Package : mysql-connector-python&lt;/p&gt;


&lt;p&gt;Version : 2.1.6-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2435&#34;&gt;CVE-2019-2435&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21272&#34;&gt;CVE-2024-21272&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21548&#34;&gt;CVE-2025-21548&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in mysql-connector-python, a
Python implementation of the MySQL client/server protocol.&lt;/p&gt;
&lt;p&gt;CVE-2019-2435&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability to man-in-the-middle attacks was discovered in the pure
Python implementation. MySQL clients connecting using TLS have not been
verifying the server name against the server certificate&#39;s common
name (CN) and subject alternative names (SANs).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-21272&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Malicious strings can be injected when utilizing dictionary-based query
parameterization via the `cursor.execute()` API command and the C-based
implementation of the connector.	
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-21548&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A possible RCE has been detected involving the MySQL Connector/Python
configuration files.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1412-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1412-1-libxml2/</link>
      <pubDate>Wed, 30 Apr 2025 18:20:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1412-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1412-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u19 (jessie), 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u13 (stretch), 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32414&#34;&gt;CVE-2025-32414&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32415&#34;&gt;CVE-2025-32415&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in libxml2, the GNOME XML library.
They are related to an out-of-bounds memory access in the Python API and a heap-buffer-overflow in xmlSchemaIDCFillNodeTables().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1411-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1411-1-expat/</link>
      <pubDate>Wed, 30 Apr 2025 18:10:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1411-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1411-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.2.0-2&amp;#43;deb9u10 (stretch), 2.2.6-2&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50602&#34;&gt;CVE-2024-50602&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in expat, an XML parsing C library.
The issue is related to a crash within XML_ResumeParser() because
XML_StopParser() can stop/suspend an unstarted parser.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1410-1 python3.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1410-1-python3.7/</link>
      <pubDate>Sun, 27 Apr 2025 14:13:57 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1410-1-python3.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1410-1-python3.7/">
      
&lt;p&gt;Package : python3.7&lt;/p&gt;


&lt;p&gt;Version : 3.7.3-2&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1795&#34;&gt;CVE-2025-1795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;List separators in email headers were wrongly Unicode-encoded in email headers in the Python3 interpreter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1409-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1409-1-zabbix/</link>
      <pubDate>Sun, 27 Apr 2025 09:53:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1409-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1409-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u10 (jessie), 1:4.0.4&amp;#43;dfsg-1&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22114&#34;&gt;CVE-2024-22114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22116&#34;&gt;CVE-2024-22116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22117&#34;&gt;CVE-2024-22117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22122&#34;&gt;CVE-2024-22122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22123&#34;&gt;CVE-2024-22123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36464&#34;&gt;CVE-2024-36464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36467&#34;&gt;CVE-2024-36467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36469&#34;&gt;CVE-2024-36469&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42325&#34;&gt;CVE-2024-42325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42332&#34;&gt;CVE-2024-42332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42333&#34;&gt;CVE-2024-42333&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45700&#34;&gt;CVE-2024-45700&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a network
monitoring solution, potentially among other effects allowing XSS, Code
Execution, information disclosure, remote code execution, impersonation or
session hijacking.&lt;/p&gt;
&lt;p&gt;Most of the CVEs are targeting the buster update, the CVE targeting jessie
is marked accordingly.&lt;/p&gt;
&lt;p&gt;CVE-2024-22114&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A user with no permission to any of the Hosts can access and view host
count &amp;amp; other statistics through System Information Widget in Global
View Dashboard.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22116&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An administrator with restricted permissions can exploit the script
execution functionality within the Monitoring Hosts section. The lack of
default escaping for script parameters enabled this user ability to
execute arbitrary code via the Ping script, thereby compromising
infrastructure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22117&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When a URL is added to the map element, it is recorded in the database
with sequential IDs. Upon adding a new URL, the system retrieves the
last sysmapelementurlid value and increments it by one. However, an
issue arises when a user manually changes the sysmapelementurlid value
by adding sysmapelementurlid + 1. This action prevents others from
adding URLs to the map element.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22122&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix allows to configure SMS notifications. AT command injection
occurs on &amp;quot;Zabbix Server&amp;quot; because there is no validation of &amp;quot;Number&amp;quot;
field on Web nor on Zabbix server side. Attacker can run test of SMS
providing specially crafted phone number and execute additional AT
commands on the modem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Setting SMS media allows to set GSM modem file. Later this file is used
as Linux device. But due everything is a file for Linux, it is possible
to set another file, e.g. log file and zabbix_server will try to
communicate with it as modem. As a result, log file will be broken with
AT commands and small part for log file content will be leaked to UI.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-36464&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When exporting media types, the password is exported in the YAML in
plain text. This appears to be a best practices type issue and may
have no actual impact. The user would need to have permissions to
access the media types and therefore would be expected to have
access to these passwords.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-36467&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An authenticated user with API access (e.g.: user with default User
role), more specifically a user with access to the user.update API
endpoint is enough to be able to add themselves to any group
(e.g.: Zabbix Administrators), except to groups that are disabled
or having restricted GUI access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-36469&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Execution time for an unsuccessful login differs when using a
non-existing username compared to using an existing one.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42325 (jessie and buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix API user.get returns all users that share common group with the
calling user. This includes media and other information, such as login
attempts, etc.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42332&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The researcher is showing that due to the way the SNMP trap log is
parsed, an attacker can craft an SNMP trap with additional lines of
information and have forged data show in the Zabbix UI. This attack
requires SNMP auth to be off and/or the attacker to know the
community/auth details. The attack requires an SNMP item to be
configured as text on the target host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42333&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The researcher is showing that it is possible to leak a small amount
of Zabbix Server memory using an out of bounds read in
src/libs/zbxmedia/email.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-45700&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled
resource exhaustion. An attacker can send specially crafted requests to
the server, which will cause the server to allocate an excessive amount
of memory and perform CPU-intensive decompression operations, ultimately
leading to a service crash.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1408-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1408-1-curl/</link>
      <pubDate>Sat, 26 Apr 2025 23:49:19 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1408-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1408-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.52.1-5&amp;#43;deb9u23 (stretch), 7.64.0-4&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2398&#34;&gt;CVE-2024-2398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8096&#34;&gt;CVE-2024-8096&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security issues were found in Curl, an easy-to-use client-side URL
transfer library and command line tool:&lt;/p&gt;
&lt;p&gt;CVE-2024-2398&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When an application tells libcurl it wants to allow HTTP/2 server push, and
the amount of received headers for the push surpasses the maximum allowed
limit (1000), libcurl aborts the server push. When aborting, libcurl
inadvertently does not free all the previously allocated headers and
instead leaks the memory.

Further, this error condition fails silently and is therefore not easily
detected by an application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-8096&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When curl is told to use the Certificate Status Request TLS extension,
often referred to as OCSP stapling, to verify that the server certificate
is valid, it might fail to detect some OCSP problems and instead wrongly
consider the response as fine.

If the returned status reports another error than &amp;quot;revoked&amp;quot; (like for
example &amp;quot;unauthorized&amp;quot;) it is not treated as a bad certificate.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1407-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1407-1-imagemagick/</link>
      <pubDate>Sat, 26 Apr 2025 23:56:09 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1407-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1407-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u28 (jessie), 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u21 (stretch), 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-43965&#34;&gt;CVE-2025-43965&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Mishandling of MIFF image depth after SetQuantumFormat() has been fixed in ImageMagick, a software suite for editing and manipulating digital images.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1406-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1406-1-distro-info-data/</link>
      <pubDate>Sat, 26 Apr 2025 09:42:26 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1406-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1406-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.36~bpo8&amp;#43;7 (jessie), 0.41&amp;#43;deb10u2~bpo9&amp;#43;7 (stretch), 0.41&amp;#43;deb10u11 (buster)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian
ELTS users.&lt;/p&gt;
&lt;p&gt;It adds Ubuntu 25.10 &amp;ldquo;Questing Quokka&amp;rdquo; and Debian 15 &amp;ldquo;Duke&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1405-1 erlang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1405-1-erlang/</link>
      <pubDate>Wed, 23 Apr 2025 19:56:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1405-1-erlang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1405-1-erlang/">
      
&lt;p&gt;Package : erlang&lt;/p&gt;


&lt;p&gt;Version : 19.2.1&amp;#43;dfsg-2&amp;#43;really23.3.4.18-0&amp;#43;deb9u4 (stretch), 1:22.2.7&amp;#43;dfsg-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-32433&#34;&gt;CVE-2025-32433&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A remote code execution vulnerability was discovered in the Erlang/OTP
implementation of the SSH protocol.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-32433&lt;/p&gt;
&lt;p&gt;A SSH server may allow an attacker to perform unauthenticated
remote code execution (RCE). By exploiting a flaw in SSH protocol
message handling, a malicious actor could gain unauthorized access
to affected systems and execute arbitrary commands without valid
credentials.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1404-1 hiredis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1404-1-hiredis/</link>
      <pubDate>Wed, 23 Apr 2025 20:42:19 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1404-1-hiredis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1404-1-hiredis/">
      
&lt;p&gt;Package : hiredis&lt;/p&gt;


&lt;p&gt;Version : 0.13.3-2&amp;#43;deb9u1 (stretch), 0.14.0-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7105&#34;&gt;CVE-2020-7105&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;NULL pointer dereferences due to unchecked return values of allocation functions have been fixed in hiredis, a C client library for the Redis key-value database.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1403-1 libsndfile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1403-1-libsndfile/</link>
      <pubDate>Wed, 23 Apr 2025 13:26:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1403-1-libsndfile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1403-1-libsndfile/">
      
&lt;p&gt;Package : libsndfile&lt;/p&gt;


&lt;p&gt;Version : 1.0.25-9.1&amp;#43;deb8u8 (jessie), 1.0.27-3&amp;#43;deb9u4 (stretch), 1.0.28-6&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33065&#34;&gt;CVE-2022-33065&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50612&#34;&gt;CVE-2024-50612&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in libsndfile, a library for
reading/writing audio files.&lt;/p&gt;
&lt;p&gt;CVE-2022-33065&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple signed integers overflow in function au_read_header in src/au.c
and in functions mat4_open and mat4_read_header in src/mat4.c in
Libsndfile, allows an attacker to cause Denial of Service or other
unspecified impacts.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-50612&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote
out-of-bounds read.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1402-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1402-1-libxstream-java/</link>
      <pubDate>Tue, 22 Apr 2025 22:08:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1402-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1402-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u7 (jessie), 1.4.11.1-1&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47072&#34;&gt;CVE-2024-47072&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;XStream is a Java library to serialize objects to XML and back again. This
vulnerability may allow a remote attacker to terminate the application with a
stack overflow error resulting in a denial of service only by manipulating the
processed input stream when XStream is configured to use the
BinaryStreamDriver. XStream has been patched to detect the manipulation in the
binary input stream causing the stack overflow and raises an
InputManipulationException instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1401-1 transfig security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1401-1-transfig/</link>
      <pubDate>Mon, 21 Apr 2025 14:32:05 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1401-1-transfig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1401-1-transfig/">
      
&lt;p&gt;Package : transfig&lt;/p&gt;


&lt;p&gt;Version : 1:3.2.6a-2~deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31162&#34;&gt;CVE-2025-31162&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31163&#34;&gt;CVE-2025-31163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31164&#34;&gt;CVE-2025-31164&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the transfig utilities for converting XFig figure files.&lt;/p&gt;
&lt;p&gt;CVE-2025-31162&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;floating point exception with huge pattern lengths
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-31163&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;non-rejection of arcs with co-incident points
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-31164&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;heap buffer overflow on arc-box with zero radius
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1400-1 fig2dev security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1400-1-fig2dev/</link>
      <pubDate>Mon, 21 Apr 2025 14:30:48 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1400-1-fig2dev/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1400-1-fig2dev/">
      
&lt;p&gt;Package : fig2dev&lt;/p&gt;


&lt;p&gt;Version : 1:3.2.6a-2&amp;#43;deb9u5 (stretch), 1:3.2.7a-5&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31162&#34;&gt;CVE-2025-31162&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31163&#34;&gt;CVE-2025-31163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31164&#34;&gt;CVE-2025-31164&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the fig2dev utilities for converting XFig figure files.&lt;/p&gt;
&lt;p&gt;CVE-2025-31162&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;floating point exception with huge pattern lengths
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-31163&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;non-rejection of arcs with co-incident points
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-31164&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;heap buffer overflow on arc-box with zero radius
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1399-1 wget security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1399-1-wget/</link>
      <pubDate>Mon, 21 Apr 2025 11:22:08 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1399-1-wget/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1399-1-wget/">
      
&lt;p&gt;Package : wget&lt;/p&gt;


&lt;p&gt;Version : 1.16-1&amp;#43;deb8u8 (jessie), 1.18-5&amp;#43;deb9u4 (stretch), 1.20.1-1.1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38428&#34;&gt;CVE-2024-38428&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Mishandling of semicolons in the userinfo subcomponent of a URI has been fixed in GNU Wget, a utility for retrieving files over HTTP, HTTPS, FTP and FTPS.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1398-1 postgresql-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1398-1-postgresql-11/</link>
      <pubDate>Fri, 18 Apr 2025 22:24:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1398-1-postgresql-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1398-1-postgresql-11/">
      
&lt;p&gt;Package : postgresql-11&lt;/p&gt;


&lt;p&gt;Version : 11.22-0&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1094&#34;&gt;CVE-2025-1094&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PostgreSQL, a popular database, was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;Improper neutralization of quoting syntax in PostgreSQL libpq functions
PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and
PQescapeStringConn() allows a database input provider to achieve
SQL injection in certain usage patterns.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1397-1 libmodbus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1397-1-libmodbus/</link>
      <pubDate>Thu, 17 Apr 2025 14:33:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1397-1-libmodbus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1397-1-libmodbus/">
      
&lt;p&gt;Package : libmodbus&lt;/p&gt;


&lt;p&gt;Version : 3.0.6-1&amp;#43;deb8u2 (jessie), 3.0.6-2&amp;#43;deb9u2 (stretch), 3.1.4-2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10918&#34;&gt;CVE-2024-10918&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10
allows to overflow the buffer allocated for the Modbus response
the function tries to reply to a Modbus request with an unexpect
length.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1396-1 jinja2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1396-1-jinja2/</link>
      <pubDate>Wed, 16 Apr 2025 22:27:03 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1396-1-jinja2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1396-1-jinja2/">
      
&lt;p&gt;Package : jinja2&lt;/p&gt;


&lt;p&gt;Version : 2.7.3-1&amp;#43;deb8u2 (jessie), 2.8-1&amp;#43;deb9u2 (stretch), 2.10-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56326&#34;&gt;CVE-2024-56326&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27516&#34;&gt;CVE-2025-27516&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A couple of vulnerabilities were found in jinja2, a template engine. The
rendering of untrusted templates could lead to attackers executing arbitrary
Python code.&lt;/p&gt;
&lt;p&gt;CVE-2024-56326&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects
calls to str.format allows an attacker that controls the content of a
template to execute arbitrary Python code. To exploit the vulnerability, an
attacker needs to control the content of a template. Whether that is the
case depends on the type of application using Jinja. This vulnerability
impacts users of applications which execute untrusted templates. Jinja&#39;s
sandbox does catch calls to str.format and ensures they don&#39;t escape the
sandbox. However, it&#39;s possible to store a reference to a malicious string&#39;s
format method, then pass that to a filter that calls it. No such filters are
built-in to Jinja, but could be present through custom filters in an
application. After the fix, such indirect calls are also handled by the
sandbox.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27516&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Prior to 3.1.6, an oversight in how the Jinja sandboxed environment
interacts with the |attr filter allows an attacker that controls the
content of a template to execute arbitrary Python code. To exploit the
vulnerability, an attacker needs to control the content of a template.
Whether that is the case depends on the type of application using Jinja.
This vulnerability impacts users of applications which execute untrusted
templates. Jinja&#39;s sandbox does catch calls to str.format and ensures they
don&#39;t escape the sandbox. However, it&#39;s possible to use the |attr filter to
get a reference to a string&#39;s plain format method, bypassing the sandbox.
After the fix, the |attr filter no longer bypasses the environment&#39;s
attribute lookup.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1395-1 shadow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1395-1-shadow/</link>
      <pubDate>Tue, 15 Apr 2025 18:55:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1395-1-shadow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1395-1-shadow/">
      
&lt;p&gt;Package : shadow&lt;/p&gt;


&lt;p&gt;Version : 1:4.2-3&amp;#43;deb8u6 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4641&#34;&gt;CVE-2023-4641&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29383&#34;&gt;CVE-2023-29383&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the shadow suite of login
tools. An attacker may extract a password from memory in limited
situations, and confuse an administrator inspecting /etc/passwd from
within a terminal.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-4641&lt;/p&gt;
&lt;p&gt;When asking for a new password, shadow-utils asks the password
twice. If the password fails on the second attempt, shadow-utils
fails in cleaning the buffer used to store the first entry. This may
allow an attacker with enough access to retrieve the password from
the memory.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-29383&lt;/p&gt;
&lt;p&gt;It is possible to inject control characters into fields provided to
the SUID program chfn (change finger). Although it is not possible
to exploit this directly (e.g., adding a new user fails because \n
is in the block list), it is possible to misrepresent the
/etc/passwd file when viewed.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1393-1 opensaml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1393-1-opensaml/</link>
      <pubDate>Tue, 15 Apr 2025 16:38:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1393-1-opensaml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1393-1-opensaml/">
      
&lt;p&gt;Package : opensaml&lt;/p&gt;


&lt;p&gt;Version : 3.0.1-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31335&#34;&gt;CVE-2025-31335&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Alexander Tan discovered that the OpenSAML C++ library was susceptible
to forging of signed SAML messages. For additional details please refer
to the upstream advisory at
&lt;a href=&#34;https://shibboleth.net/community/advisories/secadv_20250313.txt&#34;&gt;https://shibboleth.net/community/advisories/secadv_20250313.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For Debian 8 (jessie) and 9 (stretch), see separate ELA-1394-1 for opensaml2.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1394-1 opensaml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1394-1-opensaml2/</link>
      <pubDate>Tue, 15 Apr 2025 16:38:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1394-1-opensaml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1394-1-opensaml2/">
      
&lt;p&gt;Package : opensaml2&lt;/p&gt;


&lt;p&gt;Version : 2.5.3-2&amp;#43;deb8u3 (jessie), 2.6.0-4&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31335&#34;&gt;CVE-2025-31335&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Alexander Tan discovered that the OpenSAML C++ library was susceptible
to forging of signed SAML messages. For additional details please refer
to the upstream advisory at
&lt;a href=&#34;https://shibboleth.net/community/advisories/secadv_20250313.txt&#34;&gt;https://shibboleth.net/community/advisories/secadv_20250313.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For Debian 10 (buster), see separate ELA-1393-1 for opensaml.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1386-1 atop security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1386-1-atop/</link>
      <pubDate>Mon, 14 Apr 2025 19:54:30 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1386-1-atop/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1386-1-atop/">
      
&lt;p&gt;Package : atop&lt;/p&gt;


&lt;p&gt;Version : 2.4.0-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-31160&#34;&gt;CVE-2025-31160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Atop, a monitor tool for system resources and
process activity, always tried to connect to the port of atopgpud
(an additional daemon gathering GPU statistics not shipped in Debian)
while performing insufficient sanitising of the data read from this
port.&lt;/p&gt;
&lt;p&gt;With this update, additional validation is added and by default atop
no longer tries to connect to the atopgpud daemon port unless explicitly
enabled via -k.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1392-1 twitter-bootstrap4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1392-1-twitter-bootstrap4/</link>
      <pubDate>Mon, 14 Apr 2025 22:51:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1392-1-twitter-bootstrap4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1392-1-twitter-bootstrap4/">
      
&lt;p&gt;Package : twitter-bootstrap4&lt;/p&gt;


&lt;p&gt;Version : 4.3.1&amp;#43;dfsg2-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6531&#34;&gt;CVE-2024-6531&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bootstrap (formerly Twitter Bootstrap), a free and open-source CSS framework,
was affected by a XSS vulnerability in carousel component.&lt;/p&gt;
&lt;p&gt;If you use bootstrap through a module bundler, you may need to rebuild your
application.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1391-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1391-1-gimp/</link>
      <pubDate>Mon, 14 Apr 2025 13:36:02 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1391-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1391-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u3 (stretch), 2.10.8-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-2761&#34;&gt;CVE-2025-2761&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Out-of-bounds write in FLI (AutoDesk FLIC animation) file parsing has been fixed in GIMP, the GNU Image Manipulation Program.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1390-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1390-1-glib2.0/</link>
      <pubDate>Mon, 14 Apr 2025 12:03:37 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1390-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1390-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.58.3-2&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-3360&#34;&gt;CVE-2025-3360&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Integer overflow in g_date_time_new_from_iso8601() has been fixed in the GNOME library glib2.0.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1389-1 twitter-bootstrap3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1389-1-twitter-bootstrap3/</link>
      <pubDate>Sun, 13 Apr 2025 21:59:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1389-1-twitter-bootstrap3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1389-1-twitter-bootstrap3/">
      
&lt;p&gt;Package : twitter-bootstrap3&lt;/p&gt;


&lt;p&gt;Version : 3.3.7&amp;#43;dfsg-2&amp;#43;deb9u3 (stretch), 3.4.1&amp;#43;dfsg-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6484&#34;&gt;CVE-2024-6484&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6485&#34;&gt;CVE-2024-6485&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bootstrap (formerly Twitter Bootstrap), a free and open-source CSS framework,
was affected by multiple XSS vulnerabilities.&lt;/p&gt;
&lt;p&gt;If you use bootstrap through a module bundler, you may need to rebuild your
application.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1388-1 twitter-bootstrap3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1388-1-twitter-bootstrap3/</link>
      <pubDate>Sun, 13 Apr 2025 19:19:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1388-1-twitter-bootstrap3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1388-1-twitter-bootstrap3/">
      
&lt;p&gt;Package : twitter-bootstrap3&lt;/p&gt;


&lt;p&gt;Version : 3.3.7&amp;#43;dfsg-2&amp;#43;deb9u3~deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20676&#34;&gt;CVE-2018-20676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20677&#34;&gt;CVE-2018-20677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8331&#34;&gt;CVE-2019-8331&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6484&#34;&gt;CVE-2024-6484&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6485&#34;&gt;CVE-2024-6485&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bootstrap (formerly Twitter Bootstrap), a free and open-source CSS framework,
was affected by multiple XSS vulnerabilities.&lt;/p&gt;
&lt;p&gt;If you use bootstrap through a module bundler, you may need to rebuild your
application.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1387-1 erlang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1387-1-erlang/</link>
      <pubDate>Sun, 13 Apr 2025 10:07:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1387-1-erlang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1387-1-erlang/">
      
&lt;p&gt;Package : erlang&lt;/p&gt;


&lt;p&gt;Version : 1:19.2.1&amp;#43;dfsg-2&amp;#43;really23.3.4.18-0&amp;#43;deb9u3 (stretch), 1:22.2.7&amp;#43;dfsg-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-48795&#34;&gt;CVE-2023-48795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26618&#34;&gt;CVE-2025-26618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-30211&#34;&gt;CVE-2025-30211&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in Erlang/OTP, a set of libraries for the Erlang programming language.&lt;/p&gt;
&lt;p&gt;CVE-2023-48795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The SSH transport protocol, as implemented in Erlang, allows remote attackers to bypass integrity
checks such that some packets are omitted (from the extension negotiation message), and
a client and server may consequently end up with a connection for which some security features
have been downgraded or disabled, aka a Terrapin attack
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-26618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets
(conforming to max SSH packet size) are received by ssh, they might be combined into an
SFTP packet which will exceed the max allowed packet size and potentially cause
large amount of memory to be allocated (causing a Deny of Service).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-30211&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A maliciously formed KEX (Key EXchange message for SSH protocol) init message can result
with high memory usage. Implementation does not verify RFC specified limits on algorithm names
(64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient
processing of the error data. As a result, large amount of memory will be allocated
for processing malicious data.&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1385-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1385-1-php5/</link>
      <pubDate>Thu, 10 Apr 2025 23:38:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1385-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1385-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u23 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1217&#34;&gt;CVE-2025-1217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1219&#34;&gt;CVE-2025-1219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1734&#34;&gt;CVE-2025-1734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1736&#34;&gt;CVE-2025-1736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1861&#34;&gt;CVE-2025-1861&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-1217&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Düsterhus discovered that the header parser of the &lt;code&gt;http&lt;/code&gt; stream
wrapper does not handle folded headers and passes incorrect MIME
types to an attached stream notifier.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1219&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Düsterhus discovered that when requesting a HTTP resource using
the DOM or SimpleXML extensions, the wrong &lt;code&gt;content-type&lt;/code&gt; header is
used to determine the charset when the requested resource performs a
redirect.  This allows an attacker to cause a document to be parsed
incorrectly, changing its meaning and possibly bypassing validation.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1734&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the streams HTTP wrapper does not fail for
headers with invalid name and no colon, thereby violating
RFC-mandated behavior and potentially leading to request smuggling.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1736&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the stream HTTP wrapper header check might
omit basic auth header in some cases, thereby stripping it.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1861&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the stream HTTP wrapper truncate redirect
location to 1024 bytes, while the RFC-recommended length is 8000 and
browsers usually limit to around 2048.&lt;/p&gt;
&lt;p&gt;The URI truncation might result in omitting some critical
information (e.g. from the query) or even redirection to other
resources. It could even result in DOS of the remote site if the
trucated URL results in error.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1384-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1384-1-php7.0/</link>
      <pubDate>Thu, 10 Apr 2025 23:38:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1384-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1384-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u21 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1217&#34;&gt;CVE-2025-1217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1219&#34;&gt;CVE-2025-1219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1734&#34;&gt;CVE-2025-1734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1736&#34;&gt;CVE-2025-1736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1861&#34;&gt;CVE-2025-1861&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-1217&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Düsterhus discovered that the header parser of the &lt;code&gt;http&lt;/code&gt; stream
wrapper does not handle folded headers and passes incorrect MIME
types to an attached stream notifier.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1219&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Düsterhus discovered that when requesting a HTTP resource using
the DOM or SimpleXML extensions, the wrong &lt;code&gt;content-type&lt;/code&gt; header is
used to determine the charset when the requested resource performs a
redirect.  This allows an attacker to cause a document to be parsed
incorrectly, changing its meaning and possibly bypassing validation.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1734&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the streams HTTP wrapper does not fail for
headers with invalid name and no colon, thereby violating
RFC-mandated behavior and potentially leading to request smuggling.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1736&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the stream HTTP wrapper header check might
omit basic auth header in some cases, thereby stripping it.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1861&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the stream HTTP wrapper truncate redirect
location to 1024 bytes, while the RFC-recommended length is 8000 and
browsers usually limit to around 2048.&lt;/p&gt;
&lt;p&gt;The URI truncation might result in omitting some critical
information (e.g. from the query) or even redirection to other
resources. It could even result in DOS of the remote site if the
trucated URL results in error.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;GHSA-wg4p-4hqh-c3g9&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;An out of bound read was discovered in the XML parsing logic when
&lt;code&gt;XML_OPTION_SKIP_TAGSTART&lt;/code&gt; is set to a high value and the XML
document has shorter tag names than expected.  (No CVE was assigned
for this vulnerability at the time of writing.)&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1383-1 php7.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1383-1-php7.3/</link>
      <pubDate>Thu, 10 Apr 2025 23:38:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1383-1-php7.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1383-1-php7.3/">
      
&lt;p&gt;Package : php7.3&lt;/p&gt;


&lt;p&gt;Version : 7.3.31-1~deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1217&#34;&gt;CVE-2025-1217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1219&#34;&gt;CVE-2025-1219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1734&#34;&gt;CVE-2025-1734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1736&#34;&gt;CVE-2025-1736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1861&#34;&gt;CVE-2025-1861&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2025-1217&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Düsterhus discovered that the header parser of the &lt;code&gt;http&lt;/code&gt; stream
wrapper does not handle folded headers and passes incorrect MIME
types to an attached stream notifier.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1219&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Tim Düsterhus discovered that when requesting a HTTP resource using
the DOM or SimpleXML extensions, the wrong &lt;code&gt;content-type&lt;/code&gt; header is
used to determine the charset when the requested resource performs a
redirect.  This allows an attacker to cause a document to be parsed
incorrectly, changing its meaning and possibly bypassing validation.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1734&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the streams HTTP wrapper does not fail for
headers with invalid name and no colon, thereby violating
RFC-mandated behavior and potentially leading to request smuggling.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1736&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the stream HTTP wrapper header check might
omit basic auth header in some cases, thereby stripping it.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2025-1861&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that the stream HTTP wrapper truncate redirect
location to 1024 bytes, while the RFC-recommended length is 8000 and
browsers usually limit to around 2048.&lt;/p&gt;
&lt;p&gt;The URI truncation might result in omitting some critical
information (e.g. from the query) or even redirection to other
resources. It could even result in DOS of the remote site if the
trucated URL results in error.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;GHSA-wg4p-4hqh-c3g9&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;An out of bound read was discovered in the XML parsing logic when
&lt;code&gt;XML_OPTION_SKIP_TAGSTART&lt;/code&gt; is set to a high value and the XML
document has shorter tag names than expected.  (No CVE was assigned
for this vulnerability at the time of writing.)&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1343-2 proftpd-dfsg regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1343-2-proftpd-dfsg/</link>
      <pubDate>Wed, 09 Apr 2025 08:58:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1343-2-proftpd-dfsg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1343-2-proftpd-dfsg/">
      
&lt;p&gt;Package : proftpd-dfsg&lt;/p&gt;


&lt;p&gt;Version : 1.3.5e&amp;#43;r1.3.5b-4&amp;#43;deb9u5 (stretch)&lt;/p&gt;


      &lt;p&gt;The update for proftpd-dfsg announced in ELA 1343-1 introduced a regression
for Debian 9 &amp;ldquo;stretch&amp;rdquo;, making sftp public key authentification rejected by
default. Updated packages are now available to fix this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1382-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1382-1-linux-6.1/</link>
      <pubDate>Tue, 08 Apr 2025 11:23:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1382-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1382-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.129-1~deb9u1 (stretch), 6.1.129-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26596&#34;&gt;CVE-2024-26596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-40945&#34;&gt;CVE-2024-40945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42069&#34;&gt;CVE-2024-42069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42122&#34;&gt;CVE-2024-42122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45001&#34;&gt;CVE-2024-45001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47726&#34;&gt;CVE-2024-47726&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49989&#34;&gt;CVE-2024-49989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50061&#34;&gt;CVE-2024-50061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-54458&#34;&gt;CVE-2024-54458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56549&#34;&gt;CVE-2024-56549&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57834&#34;&gt;CVE-2024-57834&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57973&#34;&gt;CVE-2024-57973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57978&#34;&gt;CVE-2024-57978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57979&#34;&gt;CVE-2024-57979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57980&#34;&gt;CVE-2024-57980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57981&#34;&gt;CVE-2024-57981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57986&#34;&gt;CVE-2024-57986&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57993&#34;&gt;CVE-2024-57993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57996&#34;&gt;CVE-2024-57996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57997&#34;&gt;CVE-2024-57997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57998&#34;&gt;CVE-2024-57998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58001&#34;&gt;CVE-2024-58001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58007&#34;&gt;CVE-2024-58007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58009&#34;&gt;CVE-2024-58009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58010&#34;&gt;CVE-2024-58010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58011&#34;&gt;CVE-2024-58011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58013&#34;&gt;CVE-2024-58013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58014&#34;&gt;CVE-2024-58014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58016&#34;&gt;CVE-2024-58016&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58017&#34;&gt;CVE-2024-58017&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58020&#34;&gt;CVE-2024-58020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58034&#34;&gt;CVE-2024-58034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58051&#34;&gt;CVE-2024-58051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58052&#34;&gt;CVE-2024-58052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58054&#34;&gt;CVE-2024-58054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58055&#34;&gt;CVE-2024-58055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58056&#34;&gt;CVE-2024-58056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58058&#34;&gt;CVE-2024-58058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58061&#34;&gt;CVE-2024-58061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58063&#34;&gt;CVE-2024-58063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58068&#34;&gt;CVE-2024-58068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58069&#34;&gt;CVE-2024-58069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58071&#34;&gt;CVE-2024-58071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58072&#34;&gt;CVE-2024-58072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58076&#34;&gt;CVE-2024-58076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58077&#34;&gt;CVE-2024-58077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58080&#34;&gt;CVE-2024-58080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58083&#34;&gt;CVE-2024-58083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58085&#34;&gt;CVE-2024-58085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-58086&#34;&gt;CVE-2024-58086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21684&#34;&gt;CVE-2025-21684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21700&#34;&gt;CVE-2025-21700&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21701&#34;&gt;CVE-2025-21701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21703&#34;&gt;CVE-2025-21703&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21704&#34;&gt;CVE-2025-21704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21705&#34;&gt;CVE-2025-21705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21706&#34;&gt;CVE-2025-21706&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21707&#34;&gt;CVE-2025-21707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21708&#34;&gt;CVE-2025-21708&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21711&#34;&gt;CVE-2025-21711&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21715&#34;&gt;CVE-2025-21715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21716&#34;&gt;CVE-2025-21716&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21718&#34;&gt;CVE-2025-21718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21719&#34;&gt;CVE-2025-21719&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21722&#34;&gt;CVE-2025-21722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21724&#34;&gt;CVE-2025-21724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21725&#34;&gt;CVE-2025-21725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21726&#34;&gt;CVE-2025-21726&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21727&#34;&gt;CVE-2025-21727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21728&#34;&gt;CVE-2025-21728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21731&#34;&gt;CVE-2025-21731&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21734&#34;&gt;CVE-2025-21734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21735&#34;&gt;CVE-2025-21735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21736&#34;&gt;CVE-2025-21736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21738&#34;&gt;CVE-2025-21738&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21744&#34;&gt;CVE-2025-21744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21745&#34;&gt;CVE-2025-21745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21748&#34;&gt;CVE-2025-21748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21749&#34;&gt;CVE-2025-21749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21750&#34;&gt;CVE-2025-21750&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21753&#34;&gt;CVE-2025-21753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21758&#34;&gt;CVE-2025-21758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21760&#34;&gt;CVE-2025-21760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21761&#34;&gt;CVE-2025-21761&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21762&#34;&gt;CVE-2025-21762&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21763&#34;&gt;CVE-2025-21763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21764&#34;&gt;CVE-2025-21764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21765&#34;&gt;CVE-2025-21765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21766&#34;&gt;CVE-2025-21766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21767&#34;&gt;CVE-2025-21767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21772&#34;&gt;CVE-2025-21772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21775&#34;&gt;CVE-2025-21775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21776&#34;&gt;CVE-2025-21776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21779&#34;&gt;CVE-2025-21779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21780&#34;&gt;CVE-2025-21780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21781&#34;&gt;CVE-2025-21781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21782&#34;&gt;CVE-2025-21782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21785&#34;&gt;CVE-2025-21785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21787&#34;&gt;CVE-2025-21787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21790&#34;&gt;CVE-2025-21790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21791&#34;&gt;CVE-2025-21791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21792&#34;&gt;CVE-2025-21792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21794&#34;&gt;CVE-2025-21794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21795&#34;&gt;CVE-2025-21795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21796&#34;&gt;CVE-2025-21796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21799&#34;&gt;CVE-2025-21799&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21802&#34;&gt;CVE-2025-21802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21804&#34;&gt;CVE-2025-21804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21806&#34;&gt;CVE-2025-21806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21811&#34;&gt;CVE-2025-21811&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21812&#34;&gt;CVE-2025-21812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21814&#34;&gt;CVE-2025-21814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21819&#34;&gt;CVE-2025-21819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21820&#34;&gt;CVE-2025-21820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21821&#34;&gt;CVE-2025-21821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21823&#34;&gt;CVE-2025-21823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21826&#34;&gt;CVE-2025-21826&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21829&#34;&gt;CVE-2025-21829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21830&#34;&gt;CVE-2025-21830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21832&#34;&gt;CVE-2025-21832&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21835&#34;&gt;CVE-2025-21835&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1381-1 ruby2.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1381-1-ruby2.1/</link>
      <pubDate>Sun, 06 Apr 2025 22:49:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1381-1-ruby2.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1381-1-ruby2.1/">
      
&lt;p&gt;Package : ruby2.1&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-2&amp;#43;deb8u16 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27219&#34;&gt;CVE-2025-27219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27220&#34;&gt;CVE-2025-27220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27221&#34;&gt;CVE-2025-27221&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Ruby, a popular scripting language, was affected by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2025-27219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the CGI gem, the CGI::Cookie.parse method in the CGI library
contains a potential Denial of Service (DoS) vulnerability.
The method does not impose any limit on the length of the raw cookie
value it processes. This oversight can lead to excessive
resource consumption when parsing extremely large cookies.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the CGI gem, a Regular Expression Denial of Service (ReDoS)
vulnerability exists in the Util#escapeElement method.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the URI gem, the URI handling methods
(URI.join, URI#merge, URI#+) have an inadvertent leakage of
authentication credentials because userinfo is retained
even after changing the host.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1380-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1380-1-openjpeg2/</link>
      <pubDate>Fri, 04 Apr 2025 22:59:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1380-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1380-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.1.2-1.1&amp;#43;deb8u1 (jessie), 2.1.2-1.1&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3575&#34;&gt;CVE-2021-3575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56826&#34;&gt;CVE-2024-56826&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56827&#34;&gt;CVE-2024-56827&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in openjpeg2, a JPEG 2000
image library. Processing of maliciously crafted image files may trigger
heap-based buffer overflows which may lead to an application crash or other
undefined behavior.&lt;/p&gt;
&lt;p&gt;In order to improve the error handling of openjpeg2 in jessie, the version was
upgraded to 2.1.2, the same one as in stretch. This means long-standing minor
issues CVE-2014-7947, CVE-2016-1923 and CVE-2016-3183 are also fixed in Debian 8
&amp;ldquo;jessie&amp;rdquo; now.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1379-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1379-1-openjpeg2/</link>
      <pubDate>Fri, 04 Apr 2025 22:44:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1379-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1379-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.3.0-2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3575&#34;&gt;CVE-2021-3575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29338&#34;&gt;CVE-2021-29338&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1122&#34;&gt;CVE-2022-1122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56826&#34;&gt;CVE-2024-56826&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56827&#34;&gt;CVE-2024-56827&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in openjpeg2, a JPEG 2000
image library. Processing of maliciously crafted image files may trigger
heap-based buffer overflows which may lead to an application crash or other
undefined behavior.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1376-1 tomcat9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1376-1-tomcat9/</link>
      <pubDate>Fri, 04 Apr 2025 22:10:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1376-1-tomcat9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1376-1-tomcat9/">
      
&lt;p&gt;Package : tomcat9&lt;/p&gt;


&lt;p&gt;Version : 9.0.31-1~deb10u14 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24813&#34;&gt;CVE-2025-24813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that a malicious user was able to view security sensitive files
and/or inject content into those files when writes were enabled for the default
servlet (disabled by default) and support for partial PUT was enabled
(default). Under certain circumstances, depending on the application in use,
remote code execution may have been possible.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1377-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1377-1-tomcat8/</link>
      <pubDate>Fri, 04 Apr 2025 22:09:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1377-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1377-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u29 (jessie), 8.5.54-0&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24813&#34;&gt;CVE-2025-24813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that a malicious user was able to view security sensitive files
and/or inject content into those files when writes were enabled for the default
servlet (disabled by default) and support for partial PUT was enabled
(default). Under certain circumstances, depending on the application in use,
remote code execution may have been possible.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1378-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1378-1-tomcat7/</link>
      <pubDate>Fri, 04 Apr 2025 22:09:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1378-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1378-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u8 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24813&#34;&gt;CVE-2025-24813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that a malicious user was able to view security sensitive files
and/or inject content into those files when writes were enabled for the default
servlet (disabled by default) and support for partial PUT was enabled
(default). Under certain circumstances, depending on the application in use,
remote code execution may have been possible.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1375-1 shellinabox security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1375-1-shellinabox/</link>
      <pubDate>Fri, 04 Apr 2025 17:53:50 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1375-1-shellinabox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1375-1-shellinabox/">
      
&lt;p&gt;Package : shellinabox&lt;/p&gt;


&lt;p&gt;Version : 2.21~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16789&#34;&gt;CVE-2018-16789&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Denial of service with broken multipart/form-data has been fixed in shellinabox, a web server that can export arbitrary command line tools to a web based terminal emulator.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1374-1 ruby2.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1374-1-ruby2.3/</link>
      <pubDate>Thu, 03 Apr 2025 21:54:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1374-1-ruby2.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1374-1-ruby2.3/">
      
&lt;p&gt;Package : ruby2.3&lt;/p&gt;


&lt;p&gt;Version : 2.3.3-1&amp;#43;deb9u14 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27219&#34;&gt;CVE-2025-27219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27220&#34;&gt;CVE-2025-27220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27221&#34;&gt;CVE-2025-27221&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Ruby, a popular scripting language, was affected by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2025-27219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the CGI gem, the CGI::Cookie.parse method in the CGI library
contains a potential Denial of Service (DoS) vulnerability.
The method does not impose any limit on the length of the raw cookie
value it processes. This oversight can lead to excessive
resource consumption when parsing extremely large cookies.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the CGI gem, a Regular Expression Denial of Service (ReDoS)
vulnerability exists in the Util#escapeElement method.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the URI gem, the URI handling methods
(URI.join, URI#merge, URI#+) have an inadvertent leakage of
authentication credentials because userinfo is retained
even after changing the host.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1373-1 php-horde-turba regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1373-1-php-horde-turba/</link>
      <pubDate>Thu, 03 Apr 2025 16:45:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1373-1-php-horde-turba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1373-1-php-horde-turba/">
      
&lt;p&gt;Package : php-horde-turba&lt;/p&gt;


&lt;p&gt;Version : 4.2.23-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;An error was introduced while fixing CVE-2022-30287 in Horde Turba, an
address book component for the Horde groupware suite, see DLA 3090-1:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://lists.debian.org/debian-lts-announce/2022/08/msg00022.html&#34;&gt;https://lists.debian.org/debian-lts-announce/2022/08/msg00022.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019153&#34;&gt;https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019153&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: while php-horde-turba is currently not supported, this update
both fixes a regression and an issue on installation that hinders
testing other supported php-horde-* packages.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1372-1 php-horde-imp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1372-1-php-horde-imp/</link>
      <pubDate>Thu, 03 Apr 2025 16:40:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1372-1-php-horde-imp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1372-1-php-horde-imp/">
      
&lt;p&gt;Package : php-horde-imp&lt;/p&gt;


&lt;p&gt;Version : 6.2.22-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;Horde Editor, the HTML editor for the Horde groupware platform, relies
on CKEditor v3.  CKEditor v3 reached EOL and is not supported in
Debian buster ELTS.  This updates upgrades to CKEditor v4, as a first
step to move to CKEditor v5.&lt;/p&gt;
&lt;p&gt;Note: while php-horde-imp is currently not supported, this update is
necessary to complete the CKEditor upgrade in php-horde-editor, which
is supported, see ELA-1371-1.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1371-1 php-horde-editor security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1371-1-php-horde-editor/</link>
      <pubDate>Thu, 03 Apr 2025 16:39:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1371-1-php-horde-editor/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1371-1-php-horde-editor/">
      
&lt;p&gt;Package : php-horde-editor&lt;/p&gt;


&lt;p&gt;Version : 2.0.5&amp;#43;debian0-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;Horde Editor, the HTML editor for the Horde groupware platform, relies
on CKEditor v3.  CKEditor v3 reached EOL and is not supported in
Debian buster ELTS.  This updates upgrades to CKEditor v4, as a first
step to move to CKEditor v5.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1370-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1370-1-linux-5.10/</link>
      <pubDate>Wed, 02 Apr 2025 13:25:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1370-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1370-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.234-1~deb8u2 (jessie), 5.10.234-1~deb9u1 (stretch), 5.10.234-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52530&#34;&gt;CVE-2023-52530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26921&#34;&gt;CVE-2024-26921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27017&#34;&gt;CVE-2024-27017&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27072&#34;&gt;CVE-2024-27072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35965&#34;&gt;CVE-2024-35965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35966&#34;&gt;CVE-2024-35966&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36476&#34;&gt;CVE-2024-36476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36899&#34;&gt;CVE-2024-36899&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38538&#34;&gt;CVE-2024-38538&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38544&#34;&gt;CVE-2024-38544&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38588&#34;&gt;CVE-2024-38588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38591&#34;&gt;CVE-2024-38591&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39497&#34;&gt;CVE-2024-39497&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-40953&#34;&gt;CVE-2024-40953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41016&#34;&gt;CVE-2024-41016&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41060&#34;&gt;CVE-2024-41060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41080&#34;&gt;CVE-2024-41080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42315&#34;&gt;CVE-2024-42315&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43098&#34;&gt;CVE-2024-43098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44931&#34;&gt;CVE-2024-44931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44940&#34;&gt;CVE-2024-44940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46695&#34;&gt;CVE-2024-46695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46809&#34;&gt;CVE-2024-46809&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46841&#34;&gt;CVE-2024-46841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46849&#34;&gt;CVE-2024-46849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46853&#34;&gt;CVE-2024-46853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46854&#34;&gt;CVE-2024-46854&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46858&#34;&gt;CVE-2024-46858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46865&#34;&gt;CVE-2024-46865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47143&#34;&gt;CVE-2024-47143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47670&#34;&gt;CVE-2024-47670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47671&#34;&gt;CVE-2024-47671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47672&#34;&gt;CVE-2024-47672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47674&#34;&gt;CVE-2024-47674&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47679&#34;&gt;CVE-2024-47679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47684&#34;&gt;CVE-2024-47684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47685&#34;&gt;CVE-2024-47685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47692&#34;&gt;CVE-2024-47692&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47696&#34;&gt;CVE-2024-47696&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47697&#34;&gt;CVE-2024-47697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47698&#34;&gt;CVE-2024-47698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47699&#34;&gt;CVE-2024-47699&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47701&#34;&gt;CVE-2024-47701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47705&#34;&gt;CVE-2024-47705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47706&#34;&gt;CVE-2024-47706&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47707&#34;&gt;CVE-2024-47707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47709&#34;&gt;CVE-2024-47709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47710&#34;&gt;CVE-2024-47710&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47712&#34;&gt;CVE-2024-47712&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47713&#34;&gt;CVE-2024-47713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47718&#34;&gt;CVE-2024-47718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47723&#34;&gt;CVE-2024-47723&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47735&#34;&gt;CVE-2024-47735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47737&#34;&gt;CVE-2024-47737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47739&#34;&gt;CVE-2024-47739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47740&#34;&gt;CVE-2024-47740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47742&#34;&gt;CVE-2024-47742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47748&#34;&gt;CVE-2024-47748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47749&#34;&gt;CVE-2024-47749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47756&#34;&gt;CVE-2024-47756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47757&#34;&gt;CVE-2024-47757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48881&#34;&gt;CVE-2024-48881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49851&#34;&gt;CVE-2024-49851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49858&#34;&gt;CVE-2024-49858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49860&#34;&gt;CVE-2024-49860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49863&#34;&gt;CVE-2024-49863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49867&#34;&gt;CVE-2024-49867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49868&#34;&gt;CVE-2024-49868&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49875&#34;&gt;CVE-2024-49875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49877&#34;&gt;CVE-2024-49877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49878&#34;&gt;CVE-2024-49878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49879&#34;&gt;CVE-2024-49879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49881&#34;&gt;CVE-2024-49881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49882&#34;&gt;CVE-2024-49882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49883&#34;&gt;CVE-2024-49883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49884&#34;&gt;CVE-2024-49884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49889&#34;&gt;CVE-2024-49889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49890&#34;&gt;CVE-2024-49890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49892&#34;&gt;CVE-2024-49892&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49894&#34;&gt;CVE-2024-49894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49895&#34;&gt;CVE-2024-49895&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49896&#34;&gt;CVE-2024-49896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49900&#34;&gt;CVE-2024-49900&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49902&#34;&gt;CVE-2024-49902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49903&#34;&gt;CVE-2024-49903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49907&#34;&gt;CVE-2024-49907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49913&#34;&gt;CVE-2024-49913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49930&#34;&gt;CVE-2024-49930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49933&#34;&gt;CVE-2024-49933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49936&#34;&gt;CVE-2024-49936&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49938&#34;&gt;CVE-2024-49938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49944&#34;&gt;CVE-2024-49944&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49948&#34;&gt;CVE-2024-49948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49949&#34;&gt;CVE-2024-49949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49952&#34;&gt;CVE-2024-49952&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49955&#34;&gt;CVE-2024-49955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49957&#34;&gt;CVE-2024-49957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49958&#34;&gt;CVE-2024-49958&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49959&#34;&gt;CVE-2024-49959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49962&#34;&gt;CVE-2024-49962&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49963&#34;&gt;CVE-2024-49963&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49965&#34;&gt;CVE-2024-49965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49966&#34;&gt;CVE-2024-49966&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49969&#34;&gt;CVE-2024-49969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49973&#34;&gt;CVE-2024-49973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49974&#34;&gt;CVE-2024-49974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49975&#34;&gt;CVE-2024-49975&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49977&#34;&gt;CVE-2024-49977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49981&#34;&gt;CVE-2024-49981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49982&#34;&gt;CVE-2024-49982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49983&#34;&gt;CVE-2024-49983&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49985&#34;&gt;CVE-2024-49985&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49995&#34;&gt;CVE-2024-49995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49996&#34;&gt;CVE-2024-49996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50001&#34;&gt;CVE-2024-50001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50006&#34;&gt;CVE-2024-50006&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50007&#34;&gt;CVE-2024-50007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50008&#34;&gt;CVE-2024-50008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50010&#34;&gt;CVE-2024-50010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50013&#34;&gt;CVE-2024-50013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50015&#34;&gt;CVE-2024-50015&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50024&#34;&gt;CVE-2024-50024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50033&#34;&gt;CVE-2024-50033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50035&#34;&gt;CVE-2024-50035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50036&#34;&gt;CVE-2024-50036&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50039&#34;&gt;CVE-2024-50039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50040&#34;&gt;CVE-2024-50040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50044&#34;&gt;CVE-2024-50044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50045&#34;&gt;CVE-2024-50045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50046&#34;&gt;CVE-2024-50046&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50049&#34;&gt;CVE-2024-50049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50055&#34;&gt;CVE-2024-50055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50058&#34;&gt;CVE-2024-50058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50059&#34;&gt;CVE-2024-50059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50072&#34;&gt;CVE-2024-50072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50074&#34;&gt;CVE-2024-50074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50082&#34;&gt;CVE-2024-50082&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50083&#34;&gt;CVE-2024-50083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50095&#34;&gt;CVE-2024-50095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50096&#34;&gt;CVE-2024-50096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50099&#34;&gt;CVE-2024-50099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50103&#34;&gt;CVE-2024-50103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50115&#34;&gt;CVE-2024-50115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50116&#34;&gt;CVE-2024-50116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50117&#34;&gt;CVE-2024-50117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50121&#34;&gt;CVE-2024-50121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50127&#34;&gt;CVE-2024-50127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50131&#34;&gt;CVE-2024-50131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50134&#34;&gt;CVE-2024-50134&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50142&#34;&gt;CVE-2024-50142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50148&#34;&gt;CVE-2024-50148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50150&#34;&gt;CVE-2024-50150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50151&#34;&gt;CVE-2024-50151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50153&#34;&gt;CVE-2024-50153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50167&#34;&gt;CVE-2024-50167&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50171&#34;&gt;CVE-2024-50171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50179&#34;&gt;CVE-2024-50179&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50180&#34;&gt;CVE-2024-50180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50184&#34;&gt;CVE-2024-50184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50185&#34;&gt;CVE-2024-50185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50188&#34;&gt;CVE-2024-50188&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50192&#34;&gt;CVE-2024-50192&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50193&#34;&gt;CVE-2024-50193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50194&#34;&gt;CVE-2024-50194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50195&#34;&gt;CVE-2024-50195&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50198&#34;&gt;CVE-2024-50198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50199&#34;&gt;CVE-2024-50199&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50201&#34;&gt;CVE-2024-50201&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50202&#34;&gt;CVE-2024-50202&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50205&#34;&gt;CVE-2024-50205&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50208&#34;&gt;CVE-2024-50208&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50209&#34;&gt;CVE-2024-50209&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50210&#34;&gt;CVE-2024-50210&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50218&#34;&gt;CVE-2024-50218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50229&#34;&gt;CVE-2024-50229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50230&#34;&gt;CVE-2024-50230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50233&#34;&gt;CVE-2024-50233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50234&#34;&gt;CVE-2024-50234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50236&#34;&gt;CVE-2024-50236&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50237&#34;&gt;CVE-2024-50237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50251&#34;&gt;CVE-2024-50251&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50262&#34;&gt;CVE-2024-50262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50264&#34;&gt;CVE-2024-50264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50265&#34;&gt;CVE-2024-50265&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50267&#34;&gt;CVE-2024-50267&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50268&#34;&gt;CVE-2024-50268&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50269&#34;&gt;CVE-2024-50269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50273&#34;&gt;CVE-2024-50273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50278&#34;&gt;CVE-2024-50278&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50279&#34;&gt;CVE-2024-50279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50282&#34;&gt;CVE-2024-50282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50287&#34;&gt;CVE-2024-50287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50290&#34;&gt;CVE-2024-50290&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50292&#34;&gt;CVE-2024-50292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50295&#34;&gt;CVE-2024-50295&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50296&#34;&gt;CVE-2024-50296&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50299&#34;&gt;CVE-2024-50299&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50301&#34;&gt;CVE-2024-50301&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50302&#34;&gt;CVE-2024-50302&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50304&#34;&gt;CVE-2024-50304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52332&#34;&gt;CVE-2024-52332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53042&#34;&gt;CVE-2024-53042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53052&#34;&gt;CVE-2024-53052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53057&#34;&gt;CVE-2024-53057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53059&#34;&gt;CVE-2024-53059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53060&#34;&gt;CVE-2024-53060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53061&#34;&gt;CVE-2024-53061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53063&#34;&gt;CVE-2024-53063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53066&#34;&gt;CVE-2024-53066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53096&#34;&gt;CVE-2024-53096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53097&#34;&gt;CVE-2024-53097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53099&#34;&gt;CVE-2024-53099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53101&#34;&gt;CVE-2024-53101&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53103&#34;&gt;CVE-2024-53103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53104&#34;&gt;CVE-2024-53104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53112&#34;&gt;CVE-2024-53112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53119&#34;&gt;CVE-2024-53119&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53121&#34;&gt;CVE-2024-53121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53124&#34;&gt;CVE-2024-53124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53125&#34;&gt;CVE-2024-53125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53127&#34;&gt;CVE-2024-53127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53130&#34;&gt;CVE-2024-53130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53131&#34;&gt;CVE-2024-53131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53135&#34;&gt;CVE-2024-53135&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53136&#34;&gt;CVE-2024-53136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53138&#34;&gt;CVE-2024-53138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53140&#34;&gt;CVE-2024-53140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53141&#34;&gt;CVE-2024-53141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53142&#34;&gt;CVE-2024-53142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53145&#34;&gt;CVE-2024-53145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53146&#34;&gt;CVE-2024-53146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53148&#34;&gt;CVE-2024-53148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53150&#34;&gt;CVE-2024-53150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53155&#34;&gt;CVE-2024-53155&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53156&#34;&gt;CVE-2024-53156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53157&#34;&gt;CVE-2024-53157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53158&#34;&gt;CVE-2024-53158&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53161&#34;&gt;CVE-2024-53161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53164&#34;&gt;CVE-2024-53164&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53171&#34;&gt;CVE-2024-53171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53172&#34;&gt;CVE-2024-53172&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53173&#34;&gt;CVE-2024-53173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53174&#34;&gt;CVE-2024-53174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53181&#34;&gt;CVE-2024-53181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53183&#34;&gt;CVE-2024-53183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53184&#34;&gt;CVE-2024-53184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53194&#34;&gt;CVE-2024-53194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53197&#34;&gt;CVE-2024-53197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53198&#34;&gt;CVE-2024-53198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53214&#34;&gt;CVE-2024-53214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53217&#34;&gt;CVE-2024-53217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53226&#34;&gt;CVE-2024-53226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53227&#34;&gt;CVE-2024-53227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53237&#34;&gt;CVE-2024-53237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53239&#34;&gt;CVE-2024-53239&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53240&#34;&gt;CVE-2024-53240&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53241&#34;&gt;CVE-2024-53241&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53680&#34;&gt;CVE-2024-53680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53685&#34;&gt;CVE-2024-53685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53690&#34;&gt;CVE-2024-53690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-54031&#34;&gt;CVE-2024-54031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55916&#34;&gt;CVE-2024-55916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56531&#34;&gt;CVE-2024-56531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56532&#34;&gt;CVE-2024-56532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56533&#34;&gt;CVE-2024-56533&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56539&#34;&gt;CVE-2024-56539&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56548&#34;&gt;CVE-2024-56548&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56558&#34;&gt;CVE-2024-56558&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56562&#34;&gt;CVE-2024-56562&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56567&#34;&gt;CVE-2024-56567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56568&#34;&gt;CVE-2024-56568&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56569&#34;&gt;CVE-2024-56569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56570&#34;&gt;CVE-2024-56570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56574&#34;&gt;CVE-2024-56574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56576&#34;&gt;CVE-2024-56576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56581&#34;&gt;CVE-2024-56581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56586&#34;&gt;CVE-2024-56586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56587&#34;&gt;CVE-2024-56587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56589&#34;&gt;CVE-2024-56589&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56593&#34;&gt;CVE-2024-56593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56594&#34;&gt;CVE-2024-56594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56595&#34;&gt;CVE-2024-56595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56596&#34;&gt;CVE-2024-56596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56597&#34;&gt;CVE-2024-56597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56598&#34;&gt;CVE-2024-56598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56600&#34;&gt;CVE-2024-56600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56601&#34;&gt;CVE-2024-56601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56602&#34;&gt;CVE-2024-56602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56603&#34;&gt;CVE-2024-56603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56605&#34;&gt;CVE-2024-56605&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56606&#34;&gt;CVE-2024-56606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56610&#34;&gt;CVE-2024-56610&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56615&#34;&gt;CVE-2024-56615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56616&#34;&gt;CVE-2024-56616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56619&#34;&gt;CVE-2024-56619&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56623&#34;&gt;CVE-2024-56623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56629&#34;&gt;CVE-2024-56629&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56630&#34;&gt;CVE-2024-56630&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56631&#34;&gt;CVE-2024-56631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56633&#34;&gt;CVE-2024-56633&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56634&#34;&gt;CVE-2024-56634&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56636&#34;&gt;CVE-2024-56636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56637&#34;&gt;CVE-2024-56637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56642&#34;&gt;CVE-2024-56642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56643&#34;&gt;CVE-2024-56643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56644&#34;&gt;CVE-2024-56644&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56645&#34;&gt;CVE-2024-56645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56648&#34;&gt;CVE-2024-56648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56650&#34;&gt;CVE-2024-56650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56659&#34;&gt;CVE-2024-56659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56661&#34;&gt;CVE-2024-56661&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56662&#34;&gt;CVE-2024-56662&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56670&#34;&gt;CVE-2024-56670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56672&#34;&gt;CVE-2024-56672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56681&#34;&gt;CVE-2024-56681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56688&#34;&gt;CVE-2024-56688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56690&#34;&gt;CVE-2024-56690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56691&#34;&gt;CVE-2024-56691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56694&#34;&gt;CVE-2024-56694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56698&#34;&gt;CVE-2024-56698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56700&#34;&gt;CVE-2024-56700&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56704&#34;&gt;CVE-2024-56704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56705&#34;&gt;CVE-2024-56705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56716&#34;&gt;CVE-2024-56716&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56720&#34;&gt;CVE-2024-56720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56723&#34;&gt;CVE-2024-56723&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56724&#34;&gt;CVE-2024-56724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56728&#34;&gt;CVE-2024-56728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56739&#34;&gt;CVE-2024-56739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56747&#34;&gt;CVE-2024-56747&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56748&#34;&gt;CVE-2024-56748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56754&#34;&gt;CVE-2024-56754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56756&#34;&gt;CVE-2024-56756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56759&#34;&gt;CVE-2024-56759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56763&#34;&gt;CVE-2024-56763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56766&#34;&gt;CVE-2024-56766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56767&#34;&gt;CVE-2024-56767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56769&#34;&gt;CVE-2024-56769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56770&#34;&gt;CVE-2024-56770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56779&#34;&gt;CVE-2024-56779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56780&#34;&gt;CVE-2024-56780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57791&#34;&gt;CVE-2024-57791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57792&#34;&gt;CVE-2024-57792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57802&#34;&gt;CVE-2024-57802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57807&#34;&gt;CVE-2024-57807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57850&#34;&gt;CVE-2024-57850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57874&#34;&gt;CVE-2024-57874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57884&#34;&gt;CVE-2024-57884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57887&#34;&gt;CVE-2024-57887&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57889&#34;&gt;CVE-2024-57889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57890&#34;&gt;CVE-2024-57890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57892&#34;&gt;CVE-2024-57892&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57896&#34;&gt;CVE-2024-57896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57900&#34;&gt;CVE-2024-57900&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57901&#34;&gt;CVE-2024-57901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57902&#34;&gt;CVE-2024-57902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57904&#34;&gt;CVE-2024-57904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57906&#34;&gt;CVE-2024-57906&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57907&#34;&gt;CVE-2024-57907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57908&#34;&gt;CVE-2024-57908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57910&#34;&gt;CVE-2024-57910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57911&#34;&gt;CVE-2024-57911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57912&#34;&gt;CVE-2024-57912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57913&#34;&gt;CVE-2024-57913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57922&#34;&gt;CVE-2024-57922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57929&#34;&gt;CVE-2024-57929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57931&#34;&gt;CVE-2024-57931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57938&#34;&gt;CVE-2024-57938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57940&#34;&gt;CVE-2024-57940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57946&#34;&gt;CVE-2024-57946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57948&#34;&gt;CVE-2024-57948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57951&#34;&gt;CVE-2024-57951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21638&#34;&gt;CVE-2025-21638&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21639&#34;&gt;CVE-2025-21639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21640&#34;&gt;CVE-2025-21640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21646&#34;&gt;CVE-2025-21646&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21648&#34;&gt;CVE-2025-21648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21653&#34;&gt;CVE-2025-21653&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21664&#34;&gt;CVE-2025-21664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21666&#34;&gt;CVE-2025-21666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21669&#34;&gt;CVE-2025-21669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21678&#34;&gt;CVE-2025-21678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21683&#34;&gt;CVE-2025-21683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21687&#34;&gt;CVE-2025-21687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21688&#34;&gt;CVE-2025-21688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21689&#34;&gt;CVE-2025-21689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21692&#34;&gt;CVE-2025-21692&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21694&#34;&gt;CVE-2025-21694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21697&#34;&gt;CVE-2025-21697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21699&#34;&gt;CVE-2025-21699&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1369-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1369-1-tzdata/</link>
      <pubDate>Tue, 01 Apr 2025 13:52:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1369-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1369-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2025b-0&amp;#43;deb8u1 (jessie), 2025b-0&amp;#43;deb9u1 (stretch), 2025b-0&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2025b. Notable changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New America/Coyhaique zone for Aysén Region in Chile, which moves
from -04/-03 to -03. It will not change its clocks on 2025-04-05.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1368-1 freetype security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1368-1-freetype/</link>
      <pubDate>Tue, 01 Apr 2025 01:42:38 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1368-1-freetype/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1368-1-freetype/">
      
&lt;p&gt;Package : freetype&lt;/p&gt;


&lt;p&gt;Version : 2.6.3-3.2&amp;#43;deb9u4 (stretch), 2.9.1-3&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27363&#34;&gt;CVE-2025-27363&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out of bounds write with subglyph structures has been fixed in the font rendering library FreeType.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1367-1 suricata security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1367-1-suricata/</link>
      <pubDate>Mon, 31 Mar 2025 23:37:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1367-1-suricata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1367-1-suricata/">
      
&lt;p&gt;Package : suricata&lt;/p&gt;


&lt;p&gt;Version : 1:4.1.2-2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45098&#34;&gt;CVE-2021-45098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37151&#34;&gt;CVE-2024-37151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45796&#34;&gt;CVE-2024-45796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55626&#34;&gt;CVE-2024-55626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-29918&#34;&gt;CVE-2025-29918&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in suricata, the next Generation Intrusion
Detection and Prevention Tool.
They are related to bypass of HTTP-based signature, mishandling of multiple
fragmented packets, logic errors,  infinite loops and buffer overflows.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1366-1 libdata-entropy-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1366-1-libdata-entropy-perl/</link>
      <pubDate>Mon, 31 Mar 2025 15:11:12 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1366-1-libdata-entropy-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1366-1-libdata-entropy-perl/">
      
&lt;p&gt;Package : libdata-entropy-perl&lt;/p&gt;


&lt;p&gt;Version : 0.007-3.1&amp;#43;deb11u1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1860&#34;&gt;CVE-2025-1860&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The perl module Data::Entropy was using the cryptographically insecure rand() function as the default entropy source.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1365-1 amd64-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1365-1-amd64-microcode/</link>
      <pubDate>Mon, 31 Mar 2025 08:33:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1365-1-amd64-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1365-1-amd64-microcode/">
      
&lt;p&gt;Package : amd64-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20250311.1~deb8u1 (jessie), 3.20250311.1~deb9u1 (stretch), 3.20250311.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56161&#34;&gt;CVE-2024-56161&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential vulnerability has been found for certain AMD platforms which creates a possible confidential computing vulnerability.&lt;/p&gt;
&lt;p&gt;AMD has released updated microcode to prevent an attacker from loading tampered microcode.&lt;/p&gt;
&lt;p&gt;Additionally, an SEV firmware update might be required for some platforms to support SEV-SNP attestation, which may also necessitate a BIOS update.&lt;/p&gt;
&lt;p&gt;For details please see the AMD security bulletin AMD-SB-3019.&lt;/p&gt;
&lt;p&gt;CVE-2024-56161 (AMD-SB-3019):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privileges to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1364-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1364-1-intel-microcode/</link>
      <pubDate>Sun, 30 Mar 2025 12:46:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1364-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1364-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20250211.1~deb8u1 (jessie), 3.20250211.1~deb9u1 (stretch), 3.20250211.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34440&#34;&gt;CVE-2023-34440&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43758&#34;&gt;CVE-2023-43758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24582&#34;&gt;CVE-2024-24582&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28047&#34;&gt;CVE-2024-28047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28127&#34;&gt;CVE-2024-28127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-29214&#34;&gt;CVE-2024-29214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31068&#34;&gt;CVE-2024-31068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31157&#34;&gt;CVE-2024-31157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36293&#34;&gt;CVE-2024-36293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37020&#34;&gt;CVE-2024-37020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39279&#34;&gt;CVE-2024-39279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39355&#34;&gt;CVE-2024-39355&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Microcode updates have been released for Intel(R) processors, addressing
multiple potential vulnerabilties that may allow local privilege escalation,
denial of service or information disclosure.&lt;/p&gt;
&lt;p&gt;CVE-2023-34440 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in UEFI firmware for some Intel(R) Processors
may allow a privileged user to potentially enable escalation of
privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43758 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in UEFI firmware for some Intel(R) processors
may allow a privileged user to potentially enable escalation of
privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-24582 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in XmlCli feature for UEFI firmware for some
Intel(R) processors may allow privileged user to potentially enable
escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-28047 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in UEFI firmware for some Intel(R) Processors
may allow a privileged user to potentially enable information disclosure
via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-28127 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in UEFI firmware for some Intel(R) Processors
may allow a privileged user to potentially enable escalation of
privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-29214 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in UEFI firmware CseVariableStorageSmm for
some Intel(R) Processors may allow a privileged user to potentially
enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31068 (INTEL-SA-01166)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Finite State Machines (FSMs) in Hardware Logic for some
Intel(R) Processors may allow privileged user to potentially enable
denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31157 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper initialization in UEFI firmware OutOfBandXML module in some
Intel(R) Processors may allow a privileged user to potentially enable
information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-36293 (INTEL-SA-01213)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper access control in the EDECCSSA user leaf function for some
Intel(R) Processors with Intel(R) SGX may allow an authenticated user to
potentially enable denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-37020 (INTEL-SA-01194)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sequence of processor instructions leads to unexpected behavior in the
Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an
authenticated user to potentially enable denial of service via local
access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39279 (INTEL-SA-01139)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient granularity of access control in UEFI firmware in some
Intel(R) processors may allow a authenticated user to potentially enable
denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39355 (INTEL-SA-01228)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper handling of physical or environmental conditions in some
Intel(R) Processors may allow an authenticated user to enable denial of
service via local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1363-1 librabbitmq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1363-1-librabbitmq/</link>
      <pubDate>Sun, 30 Mar 2025 11:37:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1363-1-librabbitmq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1363-1-librabbitmq/">
      
&lt;p&gt;Package : librabbitmq&lt;/p&gt;


&lt;p&gt;Version : 0.5.2-2&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35789&#34;&gt;CVE-2023-35789&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in librabbitmq, a AMQP client library and tools written in C.
The issue is related to credential visibility when using the tools on the command line.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1362-1 librabbitmq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1362-1-librabbitmq/</link>
      <pubDate>Sun, 30 Mar 2025 11:32:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1362-1-librabbitmq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1362-1-librabbitmq/">
      
&lt;p&gt;Package : librabbitmq&lt;/p&gt;


&lt;p&gt;Version : 0.8.0-1&amp;#43;deb9u1 (stretch), 0.9.0-0.2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18609&#34;&gt;CVE-2019-18609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35789&#34;&gt;CVE-2023-35789&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in librabbitmq, a AMQP client library and tools written in C.
The issue are related to heap memory corruption due to integer overflow and credential
visibility when using the tools on the command line.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1361-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1361-1-ffmpeg/</link>
      <pubDate>Sun, 30 Mar 2025 10:33:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1361-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1361-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:4.1.11-0&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36613&#34;&gt;CVE-2024-36613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0518&#34;&gt;CVE-2025-0518&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22919&#34;&gt;CVE-2025-22919&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22921&#34;&gt;CVE-2025-22921&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in ffmpeg, a library and tools for transcoding, streaming
and playing of multimedia files.
The issues are related to out-of-bounds read, assert errors and NULL pointer dereferences.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1360-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1360-1-ffmpeg/</link>
      <pubDate>Sun, 30 Mar 2025 09:55:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1360-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1360-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36613&#34;&gt;CVE-2024-36613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0518&#34;&gt;CVE-2025-0518&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-22919&#34;&gt;CVE-2025-22919&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in ffmpeg, a library and tools for transcoding, streaming
and playing of multimedia files.
The issues are related to out-of-bounds read, assert errors and NULL pointer dereferences.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1359-1 ruby2.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1359-1-ruby2.5/</link>
      <pubDate>Fri, 28 Mar 2025 21:51:17 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1359-1-ruby2.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1359-1-ruby2.5/">
      
&lt;p&gt;Package : ruby2.5&lt;/p&gt;


&lt;p&gt;Version : 2.5.5-3&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27219&#34;&gt;CVE-2025-27219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27220&#34;&gt;CVE-2025-27220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27221&#34;&gt;CVE-2025-27221&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Ruby, a popular scripting language, was affected by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2025-27219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the CGI gem, the CGI::Cookie.parse method in the CGI library
contains a potential Denial of Service (DoS) vulnerability.
The method does not impose any limit on the length of the raw cookie
value it processes. This oversight can lead to excessive
resource consumption when parsing extremely large cookies.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the CGI gem, a Regular Expression Denial of Service (ReDoS)
vulnerability exists in the Util#escapeElement method.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the URI gem, the URI handling methods
(URI.join, URI#merge, URI#+) have an inadvertent leakage of
authentication credentials because userinfo is retained
even after changing the host.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1358-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1358-1-libxslt/</link>
      <pubDate>Fri, 28 Mar 2025 20:54:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1358-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1358-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.28-2&amp;#43;deb8u8 (jessie), 1.1.29-2.1&amp;#43;deb9u4 (stretch), 1.1.32-2.2~deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55549&#34;&gt;CVE-2024-55549&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24855&#34;&gt;CVE-2025-24855&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two use-after-free vulnerabilities have been fixed in the XSLT processing library libxslt.&lt;/p&gt;
&lt;p&gt;CVE-2024-55549&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use-after-free related to excluded namespaces
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-24855&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use-after-free of XPath context node
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1357-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1357-1-clamav/</link>
      <pubDate>Wed, 26 Mar 2025 15:34:40 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1357-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1357-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 1.0.7&amp;#43;dfsg-1~deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;This update brings ClamAV 1.0.7, which comes with the ability to keep
downloading the bytecode database (the previous version will be declared EOL by
upstream soon and lose that ability).&lt;/p&gt;
&lt;p&gt;The following packages were updated/introduced to the archive to allow the new
ClamAV build. An important side note is that those packages will not become
officially supported:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;libarchive-latest/t3.3.3-4~deb9u1&lt;/li&gt;
&lt;li&gt;libuv1-latest/1.24.1-1~deb9u1&lt;/li&gt;
&lt;li&gt;cmake-latest/3.18.4-2~deb9u1&lt;/li&gt;
&lt;li&gt;protobuf-latest/3.6.1.3-2~deb9u1&lt;/li&gt;
&lt;li&gt;grpc/1.16.1-1~deb9u1&lt;/li&gt;
&lt;li&gt;llvm-toolchain-13/1:13.0.1-6~deb9u1&lt;/li&gt;
&lt;li&gt;rustc-mozilla/1.63.0+dfsg1-2~deb9u1&lt;/li&gt;
&lt;li&gt;cargo-mozilla/0.66.0+ds1-1~deb9u1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following packages were also updated due to the new ClamAV library package:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;dansguardian/2.10.1.1-5.1+deb9u3&lt;/li&gt;
&lt;li&gt;havp/0.92a-4+deb9u2&lt;/li&gt;
&lt;li&gt;c-icap-modules/1:0.4.4-1+deb9u3&lt;/li&gt;
&lt;li&gt;libclamunrar/1.0.3-1~deb9u1&lt;/li&gt;
&lt;li&gt;python-clamav/0.4.1-8+deb9u2&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1356-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1356-1-python-django/</link>
      <pubDate>Wed, 26 Mar 2025 12:10:39 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1356-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1356-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u19 (jessie), 1:1.10.7-2&amp;#43;deb9u25 (stretch), 1:1.11.29-1&amp;#43;deb10u14 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26699&#34;&gt;CVE-2025-26699&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential denial-of-service (DoS)
vulnerability in Django, a Python-based web development framework.&lt;/p&gt;
&lt;p&gt;The issue was situated in the &lt;code&gt;wrap()&lt;/code&gt; method of the &lt;code&gt;django.utils.text&lt;/code&gt;
module. This method and the &lt;code&gt;|wordwrap&lt;/code&gt; template filter were subject to a
potential DoS attack when used with very long strings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1355-1 lighttpd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1355-1-lighttpd/</link>
      <pubDate>Mon, 24 Mar 2025 20:55:39 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1355-1-lighttpd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1355-1-lighttpd/">
      
&lt;p&gt;Package : lighttpd&lt;/p&gt;


&lt;p&gt;Version : 1.4.45-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25103&#34;&gt;CVE-2018-25103&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Fix use-after-free vulnerabilities in request parsing which might read from
invalid pointers to memory used in the same request, not from other requests.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1354-1 ruby-rack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1354-1-ruby-rack/</link>
      <pubDate>Mon, 24 Mar 2025 23:57:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1354-1-ruby-rack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1354-1-ruby-rack/">
      
&lt;p&gt;Package : ruby-rack&lt;/p&gt;


&lt;p&gt;Version : 1.6.4-4&amp;#43;deb9u7 (stretch), 2.0.6-3&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-25184&#34;&gt;CVE-2025-25184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27111&#34;&gt;CVE-2025-27111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27610&#34;&gt;CVE-2025-27610&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in ruby-rack, an interface for developing web applications in Ruby.&lt;/p&gt;
&lt;p&gt;CVE-2025-25184&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Log Injection in Rack::CommonLogger
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27111&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Log Injection in Rack::Sendfile
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27610&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Local file inclusion in Rack::Static
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1353-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1353-1-tzdata/</link>
      <pubDate>Tue, 18 Mar 2025 19:45:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1353-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1353-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2025a-0&amp;#43;deb8u1 (jessie), 2025a-0&amp;#43;deb9u1 (stretch), 2025a-0&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2025a. Notable changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paraguay adopts permanent -03 starting in spring 2024.&lt;/li&gt;
&lt;li&gt;Updated leap second list, which was set to expire by the end of
June.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1352-1 gnutls28 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1352-1-gnutls28/</link>
      <pubDate>Sun, 16 Mar 2025 20:45:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1352-1-gnutls28/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1352-1-gnutls28/">
      
&lt;p&gt;Package : gnutls28&lt;/p&gt;


&lt;p&gt;Version : 3.3.30-0&amp;#43;deb8u3 (jessie), 3.5.8-5&amp;#43;deb9u8 (stretch), 3.6.7-4&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12243&#34;&gt;CVE-2024-12243&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bing Shi discovered that certificate data with a large number of names
or name constraints were handled inefficiently, which may lead to Denial
of Service upon specially crafted certificates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1351-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1351-1-squid3/</link>
      <pubDate>Sun, 16 Mar 2025 18:15:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1351-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1351-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u8 (jessie), 3.5.23-5&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25617&#34;&gt;CVE-2024-25617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37894&#34;&gt;CVE-2024-37894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45802&#34;&gt;CVE-2024-45802&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Squid, a full featured
web proxy cache.&lt;/p&gt;
&lt;p&gt;CVE-2024-25617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Denial of Service attack against HTTP header parsing. This problem allows
a remote client or a remote server to perform Denial of Service when
sending oversized headers in HTTP messages.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-37894&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to an Out-of-bounds Write error when assigning ESI variables, Squid is
susceptible to a Memory Corruption error. This error can lead to a Denial
of Service attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-45802&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Disable ESI feature support. Due to Input Validation, Premature Release of
Resource During Expected Lifetime, and Missing Release of Resource after
Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks
by a trusted server against all clients using the proxy. This problem is
fixed by changing the build configuration to specify the --disable-esi
option.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1349-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1349-1-python2.7/</link>
      <pubDate>Fri, 14 Mar 2025 15:22:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1349-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1349-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1-1&amp;#43;deb8u13 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5642&#34;&gt;CVE-2024-5642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0938&#34;&gt;CVE-2025-0938&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. This may cause e-mail header
injection, memory leak, improper validation and denial of service
(DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-27043&lt;/p&gt;
&lt;p&gt;The email module of Python incorrectly parses e-mail addresses
that contain a special character. The wrong portion of an RFC2822
header is identified as the value of the addr-spec.  In some
applications, an attacker can bypass a protection mechanism in
which application access is granted only after verifying receipt
of e-mail to a specific domain (e.g., only @company.example.com
addresses may be used for signup).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-5642&lt;/p&gt;
&lt;p&gt;CPython doesn&amp;rsquo;t disallow configuring an empty list (&amp;quot;[]&amp;quot;) for
SSLContext.set_npn_protocols() which is an invalid value for the
underlying OpenSSL API. This results in a buffer over-read when
NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is
of low severity due to NPN being not widely used and specifying an
empty list likely being uncommon in-practice (typically a protocol
name would be configured).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-6232&lt;/p&gt;
&lt;p&gt;Regular expressions that allowed excessive backtracking during
tarfile.TarFile header parsing are vulnerable to ReDoS via
specifically-crafted tar archives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-6923&lt;/p&gt;
&lt;p&gt;The email module didn&amp;rsquo;t properly quote newlines for email headers
when serializing an email message allowing for header injection
when an email is serialized.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-7592&lt;/p&gt;
&lt;p&gt;When parsing cookies that contained backslashes for quoted
characters in the cookie value, the parser would use an algorithm
with quadratic complexity, resulting in excess CPU resources being
used while parsing the value.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-11168&lt;/p&gt;
&lt;p&gt;The urllib.parse.urlsplit() and urlparse() functions improperly
validated bracketed hosts (&lt;code&gt;[]&lt;/code&gt;), allowing hosts that weren&amp;rsquo;t IPv6
or IPvFuture. This behavior was not conformant to RFC 3986 and
potentially enabled SSRF if a URL is processed by more than one
URL parser.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-0938&lt;/p&gt;
&lt;p&gt;&lt;code&gt;urllib.parse.urlsplit&lt;/code&gt; and &lt;code&gt;urlparse&lt;/code&gt; accepted domain names that
included square brackets which isn&amp;rsquo;t valid according to RFC
3986. Square brackets are only meant to be used as delimiters for
specifying IPv6 and IPvFuture hosts in URLs. This could result in
differential parsing across the Python URL parser and other
specification-compliant URL parsers.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1348-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1348-1-python2.7/</link>
      <pubDate>Fri, 14 Mar 2025 15:22:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1348-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1348-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.13-2&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0397&#34;&gt;CVE-2024-0397&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5642&#34;&gt;CVE-2024-5642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0938&#34;&gt;CVE-2025-0938&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. This may cause e-mail header
injection, memory corruption, memory leak, improper validation and
denial of service (DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-27043&lt;/p&gt;
&lt;p&gt;The email module of Python incorrectly parses e-mail addresses
that contain a special character. The wrong portion of an RFC2822
header is identified as the value of the addr-spec.  In some
applications, an attacker can bypass a protection mechanism in
which application access is granted only after verifying receipt
of e-mail to a specific domain (e.g., only @company.example.com
addresses may be used for signup).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-0397&lt;/p&gt;
&lt;p&gt;memory race condition with the ssl.SSLContext methods
&amp;ldquo;cert_store_stats()&amp;rdquo; and &amp;ldquo;get_ca_certs()&amp;rdquo; in the &amp;ldquo;ssl&amp;rdquo; module. The
race condition can be triggered if the methods are called at the
same time as certificates are loaded into the SSLContext, such as
during the TLS handshake with a certificate directory configured.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-5642&lt;/p&gt;
&lt;p&gt;CPython doesn&amp;rsquo;t disallow configuring an empty list (&amp;quot;[]&amp;quot;) for
SSLContext.set_npn_protocols() which is an invalid value for the
underlying OpenSSL API. This results in a buffer over-read when
NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is
of low severity due to NPN being not widely used and specifying an
empty list likely being uncommon in-practice (typically a protocol
name would be configured).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-6232&lt;/p&gt;
&lt;p&gt;Regular expressions that allowed excessive backtracking during
tarfile.TarFile header parsing are vulnerable to ReDoS via
specifically-crafted tar archives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-6923&lt;/p&gt;
&lt;p&gt;The email module didn&amp;rsquo;t properly quote newlines for email headers
when serializing an email message allowing for header injection
when an email is serialized.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-7592&lt;/p&gt;
&lt;p&gt;When parsing cookies that contained backslashes for quoted
characters in the cookie value, the parser would use an algorithm
with quadratic complexity, resulting in excess CPU resources being
used while parsing the value.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-11168&lt;/p&gt;
&lt;p&gt;The urllib.parse.urlsplit() and urlparse() functions improperly
validated bracketed hosts (&lt;code&gt;[]&lt;/code&gt;), allowing hosts that weren&amp;rsquo;t IPv6
or IPvFuture. This behavior was not conformant to RFC 3986 and
potentially enabled SSRF if a URL is processed by more than one
URL parser.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-0938&lt;/p&gt;
&lt;p&gt;&lt;code&gt;urllib.parse.urlsplit&lt;/code&gt; and &lt;code&gt;urlparse&lt;/code&gt; accepted domain names that
included square brackets which isn&amp;rsquo;t valid according to RFC
3986. Square brackets are only meant to be used as delimiters for
specifying IPv6 and IPvFuture hosts in URLs. This could result in
differential parsing across the Python URL parser and other
specification-compliant URL parsers.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1350-1 pypy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1350-1-pypy/</link>
      <pubDate>Fri, 14 Mar 2025 15:11:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1350-1-pypy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1350-1-pypy/">
      
&lt;p&gt;Package : pypy&lt;/p&gt;


&lt;p&gt;Version : 5.6.0&amp;#43;dfsg-4&amp;#43;deb9u2 (stretch), 7.0.0&amp;#43;dfsg-3&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5642&#34;&gt;CVE-2024-5642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0938&#34;&gt;CVE-2025-0938&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in PyPy, a fast, compliant
alternative implementation of the Python language.&lt;/p&gt;
&lt;p&gt;All fixed vulnerabilities come from embedded code copies.&lt;/p&gt;
&lt;p&gt;For vulnerabilities from the python2.7 standard library, please refer
to
&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1349-1-python2.7/&#34;&gt;ELA-1349-1&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1347-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1347-1-python2.7/</link>
      <pubDate>Fri, 14 Mar 2025 15:08:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1347-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1347-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.16-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0397&#34;&gt;CVE-2024-0397&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-0938&#34;&gt;CVE-2025-0938&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. This may cause e-mail header
injection, memory corruption, improper validation and denial of
service (DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-27043&lt;/p&gt;
&lt;p&gt;The email module of Python incorrectly parses e-mail addresses
that contain a special character. The wrong portion of an RFC2822
header is identified as the value of the addr-spec.  In some
applications, an attacker can bypass a protection mechanism in
which application access is granted only after verifying receipt
of e-mail to a specific domain (e.g., only @company.example.com
addresses may be used for signup).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-0397&lt;/p&gt;
&lt;p&gt;memory race condition with the ssl.SSLContext methods
&amp;ldquo;cert_store_stats()&amp;rdquo; and &amp;ldquo;get_ca_certs()&amp;rdquo; in the &amp;ldquo;ssl&amp;rdquo; module. The
race condition can be triggered if the methods are called at the
same time as certificates are loaded into the SSLContext, such as
during the TLS handshake with a certificate directory configured.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-6232&lt;/p&gt;
&lt;p&gt;Regular expressions that allowed excessive backtracking during
tarfile.TarFile header parsing are vulnerable to ReDoS via
specifically-crafted tar archives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-6923&lt;/p&gt;
&lt;p&gt;The email module didn&amp;rsquo;t properly quote newlines for email headers
when serializing an email message allowing for header injection
when an email is serialized.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-7592&lt;/p&gt;
&lt;p&gt;When parsing cookies that contained backslashes for quoted
characters in the cookie value, the parser would use an algorithm
with quadratic complexity, resulting in excess CPU resources being
used while parsing the value.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-11168&lt;/p&gt;
&lt;p&gt;The urllib.parse.urlsplit() and urlparse() functions improperly
validated bracketed hosts (&lt;code&gt;[]&lt;/code&gt;), allowing hosts that weren&amp;rsquo;t IPv6
or IPvFuture. This behavior was not conformant to RFC 3986 and
potentially enabled SSRF if a URL is processed by more than one
URL parser.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2025-0938&lt;/p&gt;
&lt;p&gt;&lt;code&gt;urllib.parse.urlsplit&lt;/code&gt; and &lt;code&gt;urlparse&lt;/code&gt; accepted domain names that
included square brackets which isn&amp;rsquo;t valid according to RFC
3986. Square brackets are only meant to be used as delimiters for
specifying IPv6 and IPvFuture hosts in URLs. This could result in
differential parsing across the Python URL parser and other
specification-compliant URL parsers.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1346-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1346-1-gst-plugins-good1.0/</link>
      <pubDate>Thu, 13 Mar 2025 18:01:50 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1346-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1346-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.14.4-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47537&#34;&gt;CVE-2024-47537&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47540&#34;&gt;CVE-2024-47540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47543&#34;&gt;CVE-2024-47543&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47544&#34;&gt;CVE-2024-47544&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47545&#34;&gt;CVE-2024-47545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47546&#34;&gt;CVE-2024-47546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47596&#34;&gt;CVE-2024-47596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47597&#34;&gt;CVE-2024-47597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47599&#34;&gt;CVE-2024-47599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47601&#34;&gt;CVE-2024-47601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47602&#34;&gt;CVE-2024-47602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47603&#34;&gt;CVE-2024-47603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47606&#34;&gt;CVE-2024-47606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47613&#34;&gt;CVE-2024-47613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47774&#34;&gt;CVE-2024-47774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47775&#34;&gt;CVE-2024-47775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47776&#34;&gt;CVE-2024-47776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47777&#34;&gt;CVE-2024-47777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47778&#34;&gt;CVE-2024-47778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47834&#34;&gt;CVE-2024-47834&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework and its codecs and demuxers, which may result in denial
of service or potentially the execution of arbitrary code if a malformed
media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1345-1 squid security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1345-1-squid/</link>
      <pubDate>Tue, 11 Mar 2025 14:24:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1345-1-squid/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1345-1-squid/">
      
&lt;p&gt;Package : squid&lt;/p&gt;


&lt;p&gt;Version : 4.6-1&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23638&#34;&gt;CVE-2024-23638&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25111&#34;&gt;CVE-2024-25111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25617&#34;&gt;CVE-2024-25617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37894&#34;&gt;CVE-2024-37894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45802&#34;&gt;CVE-2024-45802&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Squid, a full featured
web proxy cache.&lt;/p&gt;
&lt;p&gt;CVE-2024-23638&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Denial of Service attack against Cache Manager error responses. This
problem allows a trusted client to perform Denial of Service when
generating error pages for Client Manager reports.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-25111&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A possible Denial of Service attack against HTTP Chunked decoder due to an
uncontrolled recursion bug. This problem allows a remote attacker to cause
Denial of Service when sending a crafted, chunked, encoded HTTP Message.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-25617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Denial of Service attack against HTTP header parsing. This problem allows
a remote client or a remote server to perform Denial of Service when
sending oversized headers in HTTP messages.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-37894&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to an Out-of-bounds Write error when assigning ESI variables, Squid is
susceptible to a Memory Corruption error. This error can lead to a Denial
of Service attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-45802&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Disable ESI feature support. Due to Input Validation, Premature Release of
Resource During Expected Lifetime, and Missing Release of Resource after
Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks
by a trusted server against all clients using the proxy. This problem is
fixed by changing the build configuration to specify the --disable-esi
option.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1344-1 commons-beanutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1344-1-commons-beanutils/</link>
      <pubDate>Sun, 09 Mar 2025 23:29:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1344-1-commons-beanutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1344-1-commons-beanutils/">
      
&lt;p&gt;Package : commons-beanutils&lt;/p&gt;


&lt;p&gt;Version : 1.9.3-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10086&#34;&gt;CVE-2019-10086&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Arbitrary code execution was possible by default in Apache Commons BeanUtils, Java classes for working with JavaBeans classes.&lt;/p&gt;
&lt;p&gt;If needed, users can restore the previous default with&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;final BeanUtilsBean bub = new BeanUtilsBean(); 
bub.getPropertyUtils().removeBeanIntrospector(SuppressPropertiesBeanIntrospector.SUPPRESS_CLASS);
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1343-1 proftpd-dfsg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1343-1-proftpd-dfsg/</link>
      <pubDate>Sun, 09 Mar 2025 15:30:32 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1343-1-proftpd-dfsg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1343-1-proftpd-dfsg/">
      
&lt;p&gt;Package : proftpd-dfsg&lt;/p&gt;


&lt;p&gt;Version : 1.3.5e&amp;#43;r1.3.5b-4&amp;#43;deb9u4 (stretch), 1.3.6-4&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-48795&#34;&gt;CVE-2023-48795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51713&#34;&gt;CVE-2023-51713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48651&#34;&gt;CVE-2024-48651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57392&#34;&gt;CVE-2024-57392&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in ProFTPD, a popular FTP server.&lt;/p&gt;
&lt;p&gt;CVE-2023-48795:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The SSH transport protocol with certain OpenSSH extensions like the SFTP implementation found in ProFTPD, allows remote attackers
to bypass integrity checks such that some packets are omitted (from the extension negotiation message),
and a client and server may consequently end up with a connection for which some security features have been downgraded
or disabled.

This attack is also known as the Terrapin attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51713:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The make_ftp_cmd function in ProFTPD has a one-byte out-of-bounds read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-48651:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A user with no supplemental groups will incorrectly inherit supplemental groups
from the parent process. The parent process retains supplemental GID 0, which is inherited by child
processes and not overwritten if the authenticated user has no supplemental groups.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-57392:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Buffer Overflow vulnerability allowed a remote attacker to execute arbitrary code (RCE) and can cause a
Denial of Service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Moreover two important bugs were fixed on this release&lt;/p&gt;
&lt;p&gt;Blastradius fix:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Fix the computation of the RADIUS Message-Authenticator signature to conform
more properly to RFC 2869, and allow RADIUS authentification to work against
mitigations of CVE-2024-3596.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Debian bug #1090813:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The PassivePorts directive can cause proftpd to swap data streams across
clients when the server is in passive mode.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1342-1 log4net security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1342-1-log4net/</link>
      <pubDate>Sun, 09 Mar 2025 13:32:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1342-1-log4net/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1342-1-log4net/">
      
&lt;p&gt;Package : log4net&lt;/p&gt;


&lt;p&gt;Version : 1.2.10&amp;#43;dfsg-8~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1285&#34;&gt;CVE-2018-1285&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;XML external entities were not disabled when parsing configuration files in log4net, a logging library for the Common Language Infrastructure (Mono, .NET).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1341-1 sqlparse security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1341-1-sqlparse/</link>
      <pubDate>Sat, 08 Mar 2025 07:54:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1341-1-sqlparse/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1341-1-sqlparse/">
      
&lt;p&gt;Package : sqlparse&lt;/p&gt;


&lt;p&gt;Version : 0.1.13-2&amp;#43;deb8u1 (jessie), 0.2.2-1&amp;#43;deb9u2 (stretch), 0.2.4-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4340&#34;&gt;CVE-2024-4340&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Uriya Yavniely discovered that passing a heavily nested list to
&lt;code&gt;sqlparse.parse()&lt;/code&gt; may raise a &lt;code&gt;RecursionError&lt;/code&gt; exception, which may
lead to denial of service.&lt;/p&gt;
&lt;p&gt;A generic &lt;code&gt;SQLParseError&lt;/code&gt; is now raised instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1340-1 emacs24 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1340-1-emacs24/</link>
      <pubDate>Wed, 05 Mar 2025 18:16:25 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1340-1-emacs24/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1340-1-emacs24/">
      
&lt;p&gt;Package : emacs24&lt;/p&gt;


&lt;p&gt;Version : 24.4&amp;#43;1-5&amp;#43;deb8u6 (jessie), 24.5&amp;#43;1-11&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45939&#34;&gt;CVE-2022-45939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53920&#34;&gt;CVE-2024-53920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1244&#34;&gt;CVE-2025-1244&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple problems were discovered in GNU Emacs, the extensible, customisable,
self-documenting real-time display editor.&lt;/p&gt;
&lt;h3 id=&#34;cve-2022-45939&#34;&gt;CVE-2022-45939&lt;/h3&gt;
&lt;p&gt;Improper use of the &lt;code&gt;system&lt;/code&gt; C library function in Emacs&amp;rsquo;s implementation of
the &lt;code&gt;ctags&lt;/code&gt; program could permit shell metacharcater injection when used on
untrusted input source code.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-53920&#34;&gt;CVE-2024-53920&lt;/h3&gt;
&lt;p&gt;Several ways to trigger arbitrary code execution were discovered in Emacs&amp;rsquo;s
support for editing files in its own dialect of Lisp. These include arbitrary
code execution upon opening an otherwise innocent-looking file, with any (or
no) file extension, for editing.&lt;/p&gt;
&lt;h3 id=&#34;cve-2025-1244&#34;&gt;CVE-2025-1244&lt;/h3&gt;
&lt;p&gt;Improper handling of custom &amp;lsquo;man&amp;rsquo; URI schemes could allow an attacker to
execute arbitrary shell commands by tricking users into visiting a specially
crafted website, or an HTTP URL with a redirect.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1339-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1339-1-linux-6.1/</link>
      <pubDate>Sun, 02 Mar 2025 17:18:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1339-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1339-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.128-1~deb9u1 (stretch), 6.1.128-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49034&#34;&gt;CVE-2022-49034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52916&#34;&gt;CVE-2023-52916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52926&#34;&gt;CVE-2023-52926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26595&#34;&gt;CVE-2024-26595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27407&#34;&gt;CVE-2024-27407&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35870&#34;&gt;CVE-2024-35870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35956&#34;&gt;CVE-2024-35956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36476&#34;&gt;CVE-2024-36476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36479&#34;&gt;CVE-2024-36479&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36899&#34;&gt;CVE-2024-36899&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37021&#34;&gt;CVE-2024-37021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39282&#34;&gt;CVE-2024-39282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41014&#34;&gt;CVE-2024-41014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42252&#34;&gt;CVE-2024-42252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42315&#34;&gt;CVE-2024-42315&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42319&#34;&gt;CVE-2024-42319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43098&#34;&gt;CVE-2024-43098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44950&#34;&gt;CVE-2024-44950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45828&#34;&gt;CVE-2024-45828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46809&#34;&gt;CVE-2024-46809&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46841&#34;&gt;CVE-2024-46841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46896&#34;&gt;CVE-2024-46896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47143&#34;&gt;CVE-2024-47143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47408&#34;&gt;CVE-2024-47408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47745&#34;&gt;CVE-2024-47745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48881&#34;&gt;CVE-2024-48881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49571&#34;&gt;CVE-2024-49571&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49861&#34;&gt;CVE-2024-49861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49891&#34;&gt;CVE-2024-49891&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49897&#34;&gt;CVE-2024-49897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49898&#34;&gt;CVE-2024-49898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49899&#34;&gt;CVE-2024-49899&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49909&#34;&gt;CVE-2024-49909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49911&#34;&gt;CVE-2024-49911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49915&#34;&gt;CVE-2024-49915&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49917&#34;&gt;CVE-2024-49917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49925&#34;&gt;CVE-2024-49925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49929&#34;&gt;CVE-2024-49929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49934&#34;&gt;CVE-2024-49934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49939&#34;&gt;CVE-2024-49939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49951&#34;&gt;CVE-2024-49951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49994&#34;&gt;CVE-2024-49994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49996&#34;&gt;CVE-2024-49996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50014&#34;&gt;CVE-2024-50014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50047&#34;&gt;CVE-2024-50047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50051&#34;&gt;CVE-2024-50051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50055&#34;&gt;CVE-2024-50055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50121&#34;&gt;CVE-2024-50121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50146&#34;&gt;CVE-2024-50146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50164&#34;&gt;CVE-2024-50164&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50248&#34;&gt;CVE-2024-50248&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50258&#34;&gt;CVE-2024-50258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50275&#34;&gt;CVE-2024-50275&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50304&#34;&gt;CVE-2024-50304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52332&#34;&gt;CVE-2024-52332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53099&#34;&gt;CVE-2024-53099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53105&#34;&gt;CVE-2024-53105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53124&#34;&gt;CVE-2024-53124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53125&#34;&gt;CVE-2024-53125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53128&#34;&gt;CVE-2024-53128&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53141&#34;&gt;CVE-2024-53141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53142&#34;&gt;CVE-2024-53142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53145&#34;&gt;CVE-2024-53145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53146&#34;&gt;CVE-2024-53146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53148&#34;&gt;CVE-2024-53148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53150&#34;&gt;CVE-2024-53150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53151&#34;&gt;CVE-2024-53151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53154&#34;&gt;CVE-2024-53154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53155&#34;&gt;CVE-2024-53155&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53156&#34;&gt;CVE-2024-53156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53157&#34;&gt;CVE-2024-53157&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53158&#34;&gt;CVE-2024-53158&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53161&#34;&gt;CVE-2024-53161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53164&#34;&gt;CVE-2024-53164&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53165&#34;&gt;CVE-2024-53165&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53170&#34;&gt;CVE-2024-53170&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53171&#34;&gt;CVE-2024-53171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53172&#34;&gt;CVE-2024-53172&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53173&#34;&gt;CVE-2024-53173&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53174&#34;&gt;CVE-2024-53174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53175&#34;&gt;CVE-2024-53175&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53180&#34;&gt;CVE-2024-53180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53181&#34;&gt;CVE-2024-53181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53183&#34;&gt;CVE-2024-53183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53184&#34;&gt;CVE-2024-53184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53190&#34;&gt;CVE-2024-53190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53194&#34;&gt;CVE-2024-53194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53196&#34;&gt;CVE-2024-53196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53197&#34;&gt;CVE-2024-53197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53198&#34;&gt;CVE-2024-53198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53206&#34;&gt;CVE-2024-53206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53207&#34;&gt;CVE-2024-53207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53208&#34;&gt;CVE-2024-53208&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53210&#34;&gt;CVE-2024-53210&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53213&#34;&gt;CVE-2024-53213&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53214&#34;&gt;CVE-2024-53214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53215&#34;&gt;CVE-2024-53215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53217&#34;&gt;CVE-2024-53217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53220&#34;&gt;CVE-2024-53220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53226&#34;&gt;CVE-2024-53226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53227&#34;&gt;CVE-2024-53227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53229&#34;&gt;CVE-2024-53229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53230&#34;&gt;CVE-2024-53230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53231&#34;&gt;CVE-2024-53231&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53233&#34;&gt;CVE-2024-53233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53234&#34;&gt;CVE-2024-53234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53237&#34;&gt;CVE-2024-53237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53239&#34;&gt;CVE-2024-53239&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53240&#34;&gt;CVE-2024-53240&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53241&#34;&gt;CVE-2024-53241&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53680&#34;&gt;CVE-2024-53680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53685&#34;&gt;CVE-2024-53685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53690&#34;&gt;CVE-2024-53690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-54031&#34;&gt;CVE-2024-54031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55881&#34;&gt;CVE-2024-55881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55916&#34;&gt;CVE-2024-55916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56369&#34;&gt;CVE-2024-56369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56531&#34;&gt;CVE-2024-56531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56532&#34;&gt;CVE-2024-56532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56533&#34;&gt;CVE-2024-56533&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56539&#34;&gt;CVE-2024-56539&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56546&#34;&gt;CVE-2024-56546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56548&#34;&gt;CVE-2024-56548&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56551&#34;&gt;CVE-2024-56551&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56557&#34;&gt;CVE-2024-56557&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56558&#34;&gt;CVE-2024-56558&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56562&#34;&gt;CVE-2024-56562&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56567&#34;&gt;CVE-2024-56567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56568&#34;&gt;CVE-2024-56568&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56569&#34;&gt;CVE-2024-56569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56570&#34;&gt;CVE-2024-56570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56572&#34;&gt;CVE-2024-56572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56574&#34;&gt;CVE-2024-56574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56575&#34;&gt;CVE-2024-56575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56576&#34;&gt;CVE-2024-56576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56578&#34;&gt;CVE-2024-56578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56579&#34;&gt;CVE-2024-56579&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56581&#34;&gt;CVE-2024-56581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56582&#34;&gt;CVE-2024-56582&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56584&#34;&gt;CVE-2024-56584&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56585&#34;&gt;CVE-2024-56585&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56586&#34;&gt;CVE-2024-56586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56587&#34;&gt;CVE-2024-56587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56589&#34;&gt;CVE-2024-56589&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56590&#34;&gt;CVE-2024-56590&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56593&#34;&gt;CVE-2024-56593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56594&#34;&gt;CVE-2024-56594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56595&#34;&gt;CVE-2024-56595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56596&#34;&gt;CVE-2024-56596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56597&#34;&gt;CVE-2024-56597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56598&#34;&gt;CVE-2024-56598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56599&#34;&gt;CVE-2024-56599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56600&#34;&gt;CVE-2024-56600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56601&#34;&gt;CVE-2024-56601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56602&#34;&gt;CVE-2024-56602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56603&#34;&gt;CVE-2024-56603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56604&#34;&gt;CVE-2024-56604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56605&#34;&gt;CVE-2024-56605&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56606&#34;&gt;CVE-2024-56606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56608&#34;&gt;CVE-2024-56608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56610&#34;&gt;CVE-2024-56610&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56614&#34;&gt;CVE-2024-56614&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56615&#34;&gt;CVE-2024-56615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56616&#34;&gt;CVE-2024-56616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56619&#34;&gt;CVE-2024-56619&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56622&#34;&gt;CVE-2024-56622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56623&#34;&gt;CVE-2024-56623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56625&#34;&gt;CVE-2024-56625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56626&#34;&gt;CVE-2024-56626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56627&#34;&gt;CVE-2024-56627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56628&#34;&gt;CVE-2024-56628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56629&#34;&gt;CVE-2024-56629&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56630&#34;&gt;CVE-2024-56630&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56631&#34;&gt;CVE-2024-56631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56633&#34;&gt;CVE-2024-56633&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56634&#34;&gt;CVE-2024-56634&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56636&#34;&gt;CVE-2024-56636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56637&#34;&gt;CVE-2024-56637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56640&#34;&gt;CVE-2024-56640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56642&#34;&gt;CVE-2024-56642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56643&#34;&gt;CVE-2024-56643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56644&#34;&gt;CVE-2024-56644&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56645&#34;&gt;CVE-2024-56645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56648&#34;&gt;CVE-2024-56648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56650&#34;&gt;CVE-2024-56650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56651&#34;&gt;CVE-2024-56651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56658&#34;&gt;CVE-2024-56658&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56659&#34;&gt;CVE-2024-56659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56660&#34;&gt;CVE-2024-56660&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56661&#34;&gt;CVE-2024-56661&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56662&#34;&gt;CVE-2024-56662&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56663&#34;&gt;CVE-2024-56663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56664&#34;&gt;CVE-2024-56664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56665&#34;&gt;CVE-2024-56665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56670&#34;&gt;CVE-2024-56670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56672&#34;&gt;CVE-2024-56672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56675&#34;&gt;CVE-2024-56675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56677&#34;&gt;CVE-2024-56677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56678&#34;&gt;CVE-2024-56678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56679&#34;&gt;CVE-2024-56679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56681&#34;&gt;CVE-2024-56681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56683&#34;&gt;CVE-2024-56683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56687&#34;&gt;CVE-2024-56687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56688&#34;&gt;CVE-2024-56688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56690&#34;&gt;CVE-2024-56690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56691&#34;&gt;CVE-2024-56691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56693&#34;&gt;CVE-2024-56693&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56694&#34;&gt;CVE-2024-56694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56698&#34;&gt;CVE-2024-56698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56700&#34;&gt;CVE-2024-56700&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56701&#34;&gt;CVE-2024-56701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56703&#34;&gt;CVE-2024-56703&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56704&#34;&gt;CVE-2024-56704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56705&#34;&gt;CVE-2024-56705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56707&#34;&gt;CVE-2024-56707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56708&#34;&gt;CVE-2024-56708&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56709&#34;&gt;CVE-2024-56709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56715&#34;&gt;CVE-2024-56715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56716&#34;&gt;CVE-2024-56716&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56717&#34;&gt;CVE-2024-56717&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56718&#34;&gt;CVE-2024-56718&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56720&#34;&gt;CVE-2024-56720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56722&#34;&gt;CVE-2024-56722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56723&#34;&gt;CVE-2024-56723&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56724&#34;&gt;CVE-2024-56724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56725&#34;&gt;CVE-2024-56725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56726&#34;&gt;CVE-2024-56726&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56727&#34;&gt;CVE-2024-56727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56728&#34;&gt;CVE-2024-56728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56739&#34;&gt;CVE-2024-56739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56741&#34;&gt;CVE-2024-56741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56745&#34;&gt;CVE-2024-56745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56746&#34;&gt;CVE-2024-56746&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56747&#34;&gt;CVE-2024-56747&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56748&#34;&gt;CVE-2024-56748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56751&#34;&gt;CVE-2024-56751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56754&#34;&gt;CVE-2024-56754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56755&#34;&gt;CVE-2024-56755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56756&#34;&gt;CVE-2024-56756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56759&#34;&gt;CVE-2024-56759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56763&#34;&gt;CVE-2024-56763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56765&#34;&gt;CVE-2024-56765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56766&#34;&gt;CVE-2024-56766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56767&#34;&gt;CVE-2024-56767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56769&#34;&gt;CVE-2024-56769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56770&#34;&gt;CVE-2024-56770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56774&#34;&gt;CVE-2024-56774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56776&#34;&gt;CVE-2024-56776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56777&#34;&gt;CVE-2024-56777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56778&#34;&gt;CVE-2024-56778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56779&#34;&gt;CVE-2024-56779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56780&#34;&gt;CVE-2024-56780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56781&#34;&gt;CVE-2024-56781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56783&#34;&gt;CVE-2024-56783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56785&#34;&gt;CVE-2024-56785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56787&#34;&gt;CVE-2024-56787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57791&#34;&gt;CVE-2024-57791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57792&#34;&gt;CVE-2024-57792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57798&#34;&gt;CVE-2024-57798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57802&#34;&gt;CVE-2024-57802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57807&#34;&gt;CVE-2024-57807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57838&#34;&gt;CVE-2024-57838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57841&#34;&gt;CVE-2024-57841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57849&#34;&gt;CVE-2024-57849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57850&#34;&gt;CVE-2024-57850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57874&#34;&gt;CVE-2024-57874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57876&#34;&gt;CVE-2024-57876&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57882&#34;&gt;CVE-2024-57882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57884&#34;&gt;CVE-2024-57884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57887&#34;&gt;CVE-2024-57887&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57889&#34;&gt;CVE-2024-57889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57890&#34;&gt;CVE-2024-57890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57892&#34;&gt;CVE-2024-57892&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57893&#34;&gt;CVE-2024-57893&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57894&#34;&gt;CVE-2024-57894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57896&#34;&gt;CVE-2024-57896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57897&#34;&gt;CVE-2024-57897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57900&#34;&gt;CVE-2024-57900&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57901&#34;&gt;CVE-2024-57901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57902&#34;&gt;CVE-2024-57902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57903&#34;&gt;CVE-2024-57903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57904&#34;&gt;CVE-2024-57904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57906&#34;&gt;CVE-2024-57906&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57907&#34;&gt;CVE-2024-57907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57908&#34;&gt;CVE-2024-57908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57910&#34;&gt;CVE-2024-57910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57911&#34;&gt;CVE-2024-57911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57912&#34;&gt;CVE-2024-57912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57913&#34;&gt;CVE-2024-57913&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57916&#34;&gt;CVE-2024-57916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57917&#34;&gt;CVE-2024-57917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57922&#34;&gt;CVE-2024-57922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57925&#34;&gt;CVE-2024-57925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57929&#34;&gt;CVE-2024-57929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57930&#34;&gt;CVE-2024-57930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57931&#34;&gt;CVE-2024-57931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57938&#34;&gt;CVE-2024-57938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57939&#34;&gt;CVE-2024-57939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57940&#34;&gt;CVE-2024-57940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57946&#34;&gt;CVE-2024-57946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57948&#34;&gt;CVE-2024-57948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57949&#34;&gt;CVE-2024-57949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57951&#34;&gt;CVE-2024-57951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21629&#34;&gt;CVE-2025-21629&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21631&#34;&gt;CVE-2025-21631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21636&#34;&gt;CVE-2025-21636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21637&#34;&gt;CVE-2025-21637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21638&#34;&gt;CVE-2025-21638&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21639&#34;&gt;CVE-2025-21639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21640&#34;&gt;CVE-2025-21640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21646&#34;&gt;CVE-2025-21646&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21647&#34;&gt;CVE-2025-21647&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21648&#34;&gt;CVE-2025-21648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21653&#34;&gt;CVE-2025-21653&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21655&#34;&gt;CVE-2025-21655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21660&#34;&gt;CVE-2025-21660&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21662&#34;&gt;CVE-2025-21662&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21664&#34;&gt;CVE-2025-21664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21665&#34;&gt;CVE-2025-21665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21666&#34;&gt;CVE-2025-21666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21667&#34;&gt;CVE-2025-21667&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21668&#34;&gt;CVE-2025-21668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21669&#34;&gt;CVE-2025-21669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21671&#34;&gt;CVE-2025-21671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21675&#34;&gt;CVE-2025-21675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21678&#34;&gt;CVE-2025-21678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21680&#34;&gt;CVE-2025-21680&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21681&#34;&gt;CVE-2025-21681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21683&#34;&gt;CVE-2025-21683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21687&#34;&gt;CVE-2025-21687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21688&#34;&gt;CVE-2025-21688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21689&#34;&gt;CVE-2025-21689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21690&#34;&gt;CVE-2025-21690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21692&#34;&gt;CVE-2025-21692&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21694&#34;&gt;CVE-2025-21694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21697&#34;&gt;CVE-2025-21697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21699&#34;&gt;CVE-2025-21699&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1338-1 nodejs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1338-1-nodejs/</link>
      <pubDate>Sun, 02 Mar 2025 11:06:01 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1338-1-nodejs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1338-1-nodejs/">
      
&lt;p&gt;Package : nodejs&lt;/p&gt;


&lt;p&gt;Version : 10.24.0~dfsg-1~deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-23085&#34;&gt;CVE-2025-23085&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was fixed in Node.js, a popular JavaScript runtime
implementation.&lt;/p&gt;
&lt;p&gt;A memory leak could occur when a remote peer (client) abruptly closes an HTTP/2
socket without sending a GOAWAY notification.
Additionally, the same leak could be triggered if an invalid header is detected
by nghttp2, causing the connection to be terminated by the peer.&lt;/p&gt;
&lt;p&gt;This flaw could lead to increased memory consumption and potential denial of service
under certain conditions. This vulnerability affects Node.js HTTP/2 Server users.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1337-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1337-1-xorg-server/</link>
      <pubDate>Sat, 01 Mar 2025 00:23:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1337-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1337-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u18 (jessie), 2:1.19.2-1&amp;#43;deb9u21 (stretch), 2:1.20.4-1&amp;#43;deb10u16 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26594&#34;&gt;CVE-2025-26594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26595&#34;&gt;CVE-2025-26595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26596&#34;&gt;CVE-2025-26596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26597&#34;&gt;CVE-2025-26597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26598&#34;&gt;CVE-2025-26598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26599&#34;&gt;CVE-2025-26599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26600&#34;&gt;CVE-2025-26600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26601&#34;&gt;CVE-2025-26601&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server,
which may result in privilege escalation if the X server is running
privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-822-2 amanda regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-822-2-amanda/</link>
      <pubDate>Sat, 01 Mar 2025 00:02:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-822-2-amanda/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-822-2-amanda/">
      
&lt;p&gt;Package : amanda&lt;/p&gt;


&lt;p&gt;Version : 1:3.3.9-5&amp;#43;deb9u3 (stretch)&lt;/p&gt;


      &lt;p&gt;A fix of CVE-2022-37704 for amanda, the Advanced Maryland Automatic Network Disk Archiver, has been found incomplete.
This update fixes handling of RSH environment variables and uses a correct check for dump/xfsdump.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1336-1 libtasn1-6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1336-1-libtasn1-6/</link>
      <pubDate>Fri, 28 Feb 2025 18:25:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1336-1-libtasn1-6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1336-1-libtasn1-6/">
      
&lt;p&gt;Package : libtasn1-6&lt;/p&gt;


&lt;p&gt;Version : 4.2-3&amp;#43;deb8u6 (jessie), 4.10-1.1&amp;#43;deb9u3 (stretch), 4.13-3&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12133&#34;&gt;CVE-2024-12133&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bing Shi discovered that certificate data with a large number of names
or name constraints were handled inefficiently, which may lead to Denial
of Service upon specially crafted certificates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1331-1 dnsmasq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1331-1-dnsmasq/</link>
      <pubDate>Fri, 28 Feb 2025 14:24:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1331-1-dnsmasq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1331-1-dnsmasq/">
      
&lt;p&gt;Package : dnsmasq&lt;/p&gt;


&lt;p&gt;Version : 2.72-3&amp;#43;deb8u8 (jessie), 2.76-5&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50387&#34;&gt;CVE-2023-50387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50868&#34;&gt;CVE-2023-50868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were found in dnsmasq, a small caching DNS proxy and
DHCP/TFTP server, which could lead to denial of service by querying specially
crafted DNS resource records in control of an attacker.&lt;/p&gt;
&lt;p&gt;CVE-2023-50387&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840,
and related RFCs) allow remote attackers to cause a denial of service (CPU
consumption) via one or more DNSSEC responses, aka the &amp;quot;KeyTrap&amp;quot; issue. One
of the concerns is that, when there is a zone with many DNSKEY and RRSIG
records, the protocol specification implies that an algorithm must evaluate
all combinations of DNSKEY and RRSIG records.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-50868&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC
9276 guidance is skipped) allows remote attackers to cause a denial of
service (CPU consumption for SHA-1 computations) via DNSSEC responses in a
random subdomain attack, aka the &amp;quot;NSEC3&amp;quot; issue. The RFC 5155 specification
implies that an algorithm must perform thousands of iterations of a hash
function in certain situations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;For jessie and stretch, DNSSEC support has been disabled, as a backport of the
fix was deemed too disruptive. Administrators can still validate DNS lookups on
downstream clients by installing a validating resolver there. For administrators
that require DNSSEC support in dnsmasq, we recommend upgrading to at least
buster.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1335-1 emacs25 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1335-1-emacs25/</link>
      <pubDate>Fri, 28 Feb 2025 17:03:41 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1335-1-emacs25/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1335-1-emacs25/">
      
&lt;p&gt;Package : emacs25&lt;/p&gt;


&lt;p&gt;Version : 25.1&amp;#43;1-4&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53920&#34;&gt;CVE-2024-53920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1244&#34;&gt;CVE-2025-1244&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple problems were discovered in GNU Emacs, the extensible, customisable,
self-documenting real-time display editor.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-53920&#34;&gt;CVE-2024-53920&lt;/h3&gt;
&lt;p&gt;Several ways to trigger arbitrary code execution were discovered in Emacs&amp;rsquo;s
support for editing files in its own dialect of Lisp. These include arbitrary
code execution upon opening an otherwise innocent-looking file, with any (or
no) file extension, for editing.&lt;/p&gt;
&lt;h3 id=&#34;cve-2025-1244&#34;&gt;CVE-2025-1244&lt;/h3&gt;
&lt;p&gt;Improper handling of custom &amp;lsquo;man&amp;rsquo; URI schemes could allow an attacker to
execute arbitrary shell commands by tricking users into visiting a specially
crafted website, or an HTTP URL with a redirect.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1334-1 emacs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1334-1-emacs/</link>
      <pubDate>Fri, 28 Feb 2025 17:02:42 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1334-1-emacs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1334-1-emacs/">
      
&lt;p&gt;Package : emacs&lt;/p&gt;


&lt;p&gt;Version : 1:26.1&amp;#43;1-3.2&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53920&#34;&gt;CVE-2024-53920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-1244&#34;&gt;CVE-2025-1244&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple problems were discovered in GNU Emacs, the extensible, customisable,
self-documenting real-time display editor.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-53920&#34;&gt;CVE-2024-53920&lt;/h3&gt;
&lt;p&gt;Several ways to trigger arbitrary code execution were discovered in Emacs&amp;rsquo;s
support for editing files in its own dialect of Lisp. These include arbitrary
code execution upon opening an otherwise innocent-looking file, with any (or
no) file extension, for editing.&lt;/p&gt;
&lt;h3 id=&#34;cve-2025-1244&#34;&gt;CVE-2025-1244&lt;/h3&gt;
&lt;p&gt;Improper handling of custom &amp;lsquo;man&amp;rsquo; URI schemes could allow an attacker to
execute arbitrary shell commands by tricking users into visiting a specially
crafted website, or an HTTP URL with a redirect.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1333-1 ruby2.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1333-1-ruby2.1/</link>
      <pubDate>Thu, 27 Feb 2025 19:27:49 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1333-1-ruby2.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1333-1-ruby2.1/">
      
&lt;p&gt;Package : ruby2.1&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-2&amp;#43;deb8u15 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35176&#34;&gt;CVE-2024-35176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39908&#34;&gt;CVE-2024-39908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41123&#34;&gt;CVE-2024-41123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41946&#34;&gt;CVE-2024-41946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43398&#34;&gt;CVE-2024-43398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49761&#34;&gt;CVE-2024-49761&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in ruby a popular programming
language.&lt;/p&gt;
&lt;p&gt;CVE-2024-35176&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has a Denial of Service (DoS) vulnerability
when it parses an XML that has many &amp;lt;s in
an attribute value. Those who need to parse
untrusted XMLs may be impacted to this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39908&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some Denial of Service (DoS) vulnerabilities
when it parses an XML that has many specific characters such
as &amp;lt;, 0 and %&amp;gt;. If you need to parse untrusted XMLs,
you many be impacted to these vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some DoS vulnerabilities when it parses an XML
that has many specific characters such as whitespace character,
&amp;gt;] and ]&amp;gt;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some Denial of Service (DoS) vulnerabilities
when it parses an XML that has many specific characters
such as whitespace character, &amp;gt;] and ]&amp;gt;.
If you need to parse untrusted XMLs, you may be impacted
to these vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem had a Denial of Service (DoS) vulnerability
when it parses an XML that has many entity expansions
with SAX2 or pull parser API.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43398&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;REXML is an XML toolkit for Ruby.
The REXML gem before 3.3.6 has a Denial of Service (DoS)
vulnerability when it parses an XML that has many deep
elements that have same local name attributes.
If you need to parse untrusted XMLs with tree parser
API like REXML::Document.new, you may be impacted
to this vulnerability. If you use other parser APIs
such as stream parser API and SAX2 parser API,
you are not impacted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-49761&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;REXML is an XML toolkit for Ruby.
The REXML gem before 3.3.9 has a ReDoS vulnerability
when it parses an XML that has many digits between
&amp;amp;# and x...; in a hex numeric character reference (&amp;amp;#x...;)
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1332-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1332-1-apache2/</link>
      <pubDate>Thu, 27 Feb 2025 19:13:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1332-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1332-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u30 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38473&#34;&gt;CVE-2024-38473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;apache2 a popular webserver was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;Encoding problem allows request URLs with incorrect encoding to be sent
to backend services, potentially bypassing authentication via crafted
requests.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1330-1 ruby2.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1330-1-ruby2.3/</link>
      <pubDate>Tue, 25 Feb 2025 16:42:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1330-1-ruby2.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1330-1-ruby2.3/">
      
&lt;p&gt;Package : ruby2.3&lt;/p&gt;


&lt;p&gt;Version : 2.3.3-1&amp;#43;deb9u13 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28965&#34;&gt;CVE-2021-28965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35176&#34;&gt;CVE-2024-35176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39908&#34;&gt;CVE-2024-39908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41123&#34;&gt;CVE-2024-41123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41946&#34;&gt;CVE-2024-41946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43398&#34;&gt;CVE-2024-43398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49761&#34;&gt;CVE-2024-49761&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in ruby a popular programming
language.&lt;/p&gt;
&lt;p&gt;CVE-2024-35176&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has a Denial of Service (DoS) vulnerability
when it parses an XML that has many &amp;lt;s in
an attribute value. Those who need to parse
untrusted XMLs may be impacted to this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39908&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some Denial of Service (DoS) vulnerabilities
when it parses an XML that has many specific characters such
as &amp;lt;, 0 and %&amp;gt;. If you need to parse untrusted XMLs,
you many be impacted to these vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some Denial of Service (DoS) vulnerabilities
when it parses an XML that has many specific characters
such as whitespace character, &amp;gt;] and ]&amp;gt;.
If you need to parse untrusted XMLs, you may be impacted
to these vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some DoS vulnerabilities when it parses an XML
that has many specific characters such as whitespace character,
&amp;gt;] and ]&amp;gt;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem had a Denial of Service (DoS) vulnerability
when it parses an XML that has many entity expansions
with SAX2 or pull parser API.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43398&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;REXML is an XML toolkit for Ruby.
The REXML gem before 3.3.6 has a Denial of Service (DoS)
vulnerability when it parses an XML that has many deep
elements that have same local name attributes.
If you need to parse untrusted XMLs with tree parser
API like REXML::Document.new, you may be impacted
to this vulnerability. If you use other parser APIs
such as stream parser API and SAX2 parser API,
you are not impacted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-49761&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;REXML is an XML toolkit for Ruby.
The REXML gem before 3.3.9 has a ReDoS vulnerability
when it parses an XML that has many digits between
&amp;amp;# and x...; in a hex numeric character reference (&amp;amp;#x...;)
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1329-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1329-1-apache2/</link>
      <pubDate>Tue, 25 Feb 2025 16:37:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1329-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1329-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.25-3&amp;#43;deb9u20 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38473&#34;&gt;CVE-2024-38473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;apache2 a popular webserver was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;Encoding problem allows request URLs with incorrect encoding to be sent
to backend services, potentially bypassing authentication via crafted
requests.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1328-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1328-1-krb5/</link>
      <pubDate>Mon, 24 Feb 2025 21:31:08 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1328-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1328-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-19&amp;#43;deb8u10 (jessie), 1.15-1&amp;#43;deb9u7 (stretch), 1.17-3&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24528&#34;&gt;CVE-2025-24528&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;MIT krb5 a popular implementation of kerberos 5 authentication protocol
was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;An authenticated attacker can cause kadmind to write beyond
the end of the mapped region for the iprop log file, likely causing a
process crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1327-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1327-1-libxml2/</link>
      <pubDate>Mon, 24 Feb 2025 18:58:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1327-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1327-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u18 (jessie), 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u12 (stretch), 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-49043&#34;&gt;CVE-2022-49043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39615&#34;&gt;CVE-2023-39615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45322&#34;&gt;CVE-2023-45322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25062&#34;&gt;CVE-2024-25062&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56171&#34;&gt;CVE-2024-56171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-24928&#34;&gt;CVE-2025-24928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-27113&#34;&gt;CVE-2025-27113&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been found in libxml2, a library providing
support to read, modify and write XML and HTML files. These
vulnerabilities could potentially lead to denial of servie or other
unintended behaviors.&lt;/p&gt;
&lt;p&gt;CVE-2022-49043&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39615 (Stretch only)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at 
/libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor&#39;s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45322 (Stretch only)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor&#39;s position is &amp;quot;I don&#39;t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can&#39;t control when memory allocations fail.&amp;quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-25062 (Stretch only)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-56171&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-24928&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2025-27113&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1325-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1325-1-bind9/</link>
      <pubDate>Fri, 21 Feb 2025 09:55:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1325-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1325-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.10.3.dfsg.P4-12.3&amp;#43;deb9u18 (stretch), 1:9.11.5.P4&amp;#43;dfsg-5.1&amp;#43;deb10u14 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11187&#34;&gt;CVE-2024-11187&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;One vulnerability was discovered in BIND, a DNS server implementation, which
may result in denial of service.&lt;/p&gt;
&lt;p&gt;It is possible to construct a zone such that some queries to it will generate
responses containing numerous records in the Additional section. An attacker
sending many such queries can cause either the authoritative server itself or
an independent resolver to use disproportionate resources processing the
queries. Zones will usually need to have been deliberately crafted to exploit
this flaw.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1326-1 python-urllib3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1326-1-python-urllib3/</link>
      <pubDate>Fri, 21 Feb 2025 00:59:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1326-1-python-urllib3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1326-1-python-urllib3/">
      
&lt;p&gt;Package : python-urllib3&lt;/p&gt;


&lt;p&gt;Version : 1.9.1-3&amp;#43;deb8u3 (jessie), 1.19.1-1&amp;#43;deb9u3 (stretch), 1.24.1-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37891&#34;&gt;CVE-2024-37891&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that when sending HTTP requests &lt;em&gt;without&lt;/em&gt; using
urllib3&amp;rsquo;s proxy support, it&amp;rsquo;s possible to accidentally set the
&lt;code&gt;Proxy-Authorization&lt;/code&gt; header even though it won&amp;rsquo;t have any effect as the
request is not using a forwarding proxy or a tunneling proxy.&lt;/p&gt;
&lt;p&gt;In those cases, urllib3 doesn&amp;rsquo;t treat the &lt;code&gt;Proxy-Authorization&lt;/code&gt; HTTP
header as one carrying authentication material and thus doesn&amp;rsquo;t strip
the header on cross-origin redirects, which might lead to authorization
bypass.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1324-1 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1324-1-openssh/</link>
      <pubDate>Thu, 20 Feb 2025 19:42:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1324-1-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1324-1-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:7.4p1-10&amp;#43;deb9u10 (stretch), 1:7.9p1-10&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-26465&#34;&gt;CVE-2025-26465&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Threat Research Unit (TRU) discovered that the OpenSSH client
is vulnerable to a machine-in-the-middle attack if the VerifyHostKeyDNS
option is enabled (disabled by default).&lt;/p&gt;
&lt;p&gt;The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy
leading to an information leak in the algorithm negotiation. This allows
man-in-the-middle attackers to target initial connection attempts (where
no host key for the server has been cached by the client). This issue was
assigned CVE-2020-14145. Completely removing this information leak would
cause other problems, but this update includes a partial mitigation by
preferring the default ordering if the user has a key that matches the
best-preference default algorithm.&lt;/p&gt;
&lt;p&gt;In addition, the stretch update fixes a regression introduced with the
fix for CVE-2023-48795, which could cause segmentation faults under some
circumstances.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1323-1 pypy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1323-1-pypy/</link>
      <pubDate>Fri, 14 Feb 2025 10:27:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1323-1-pypy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1323-1-pypy/">
      
&lt;p&gt;Package : pypy&lt;/p&gt;


&lt;p&gt;Version : 7.0.0&amp;#43;dfsg-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-7185&#34;&gt;CVE-2014-7185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-20107&#34;&gt;CVE-2015-20107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1060&#34;&gt;CVE-2018-1060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1061&#34;&gt;CVE-2018-1061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20852&#34;&gt;CVE-2018-20852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9636&#34;&gt;CVE-2019-9636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9948&#34;&gt;CVE-2019-9948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16056&#34;&gt;CVE-2019-16056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16935&#34;&gt;CVE-2019-16935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20907&#34;&gt;CVE-2019-20907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8492&#34;&gt;CVE-2020-8492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26116&#34;&gt;CVE-2020-26116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29651&#34;&gt;CVE-2020-29651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3733&#34;&gt;CVE-2021-3733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3737&#34;&gt;CVE-2021-3737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4189&#34;&gt;CVE-2021-4189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45061&#34;&gt;CVE-2022-45061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48565&#34;&gt;CVE-2022-48565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48566&#34;&gt;CVE-2022-48566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40217&#34;&gt;CVE-2023-40217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0450&#34;&gt;CVE-2024-0450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in PyPy, a fast, compliant
alternative implementation of the Python language.&lt;/p&gt;
&lt;p&gt;All fixed vulnerabilities come from embedded code copies.&lt;/p&gt;
&lt;p&gt;For vulnerabilities from the python2.7 standard library, please refer
to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/security/dsa-4306-1&#34;&gt;DSA-4306-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/lts/security/dla-2337-1&#34;&gt;DLA-2337-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/lts/security/dla-2628-1&#34;&gt;DLA-2628-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/lts/security/dla-2919-1&#34;&gt;DLA-2919-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-853-1-python2.7/&#34;&gt;ELA-853-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-950-1-python2.7/&#34;&gt;ELA-950-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1065-1-python2.7/&#34;&gt;ELA-1065-1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;One vulnerability comes from internal python2.7 C code copy, Pypy is
only affected when making use of the compatibility layer for Python C
extension (cpyext):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2014-7185&lt;/p&gt;
&lt;p&gt;Integer overflow in bufferobject.c in Python before 2.7.8 allows
context-dependent attackers to obtain sensitive information from
process memory via a large size and offset in a &amp;ldquo;buffer&amp;rdquo; function.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The remaining minor vulnerability comes from a python-pi embedded
copy. We believe it is not exploitable, as the bundled py module is
only used during package build, but it is included for consistency
with pypy3 DLA-3966-1:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-29651&lt;/p&gt;
&lt;p&gt;A denial of service via regular expression in the py.path.svnwc
component of py (aka python-py) could be used by attackers to cause
a compute-time denial of service attack by supplying malicious input
to the blame functionality.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1322-1 pypy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1322-1-pypy/</link>
      <pubDate>Fri, 14 Feb 2025 10:27:12 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1322-1-pypy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1322-1-pypy/">
      
&lt;p&gt;Package : pypy&lt;/p&gt;


&lt;p&gt;Version : 5.6.0&amp;#43;dfsg-4&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-7185&#34;&gt;CVE-2014-7185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-20107&#34;&gt;CVE-2015-20107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1060&#34;&gt;CVE-2018-1060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1061&#34;&gt;CVE-2018-1061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20852&#34;&gt;CVE-2018-20852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000802&#34;&gt;CVE-2018-1000802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9636&#34;&gt;CVE-2019-9636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9948&#34;&gt;CVE-2019-9948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16056&#34;&gt;CVE-2019-16056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16935&#34;&gt;CVE-2019-16935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20907&#34;&gt;CVE-2019-20907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8492&#34;&gt;CVE-2020-8492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26116&#34;&gt;CVE-2020-26116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29651&#34;&gt;CVE-2020-29651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3733&#34;&gt;CVE-2021-3733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3737&#34;&gt;CVE-2021-3737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4189&#34;&gt;CVE-2021-4189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45061&#34;&gt;CVE-2022-45061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48565&#34;&gt;CVE-2022-48565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48566&#34;&gt;CVE-2022-48566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40217&#34;&gt;CVE-2023-40217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0450&#34;&gt;CVE-2024-0450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in PyPy, a fast, compliant
alternative implementation of the Python language.&lt;/p&gt;
&lt;p&gt;All fixed vulnerabilities come from embedded code copies.&lt;/p&gt;
&lt;p&gt;For vulnerabilities from the python2.7 standard library, please refer
to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/security/dsa-4306-1&#34;&gt;DSA-4306-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/lts/security/dla-2337-1&#34;&gt;DLA-2337-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/lts/security/dla-2628-1&#34;&gt;DLA-2628-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.debian.org/lts/security/dla-2919-1&#34;&gt;DLA-2919-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-853-1-python2.7/&#34;&gt;ELA-853-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-950-1-python2.7/&#34;&gt;ELA-950-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freexian.com/lts/extended/updates/ela-1065-1-python2.7/&#34;&gt;ELA-1065-1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;One vulnerability comes from internal python2.7 C code copy, Pypy is
only affected when making use of the compatibility layer for Python C
extension (cpyext):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2014-7185&lt;/p&gt;
&lt;p&gt;Integer overflow in bufferobject.c in Python before 2.7.8 allows
context-dependent attackers to obtain sensitive information from
process memory via a large size and offset in a &amp;ldquo;buffer&amp;rdquo; function.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The remaining minor vulnerability comes from a python-pi embedded
copy. We believe it is not exploitable, as the bundled py module is
only used during package build, but it is included for consistency
with pypy3 DLA-3966-1:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-29651&lt;/p&gt;
&lt;p&gt;A denial of service via regular expression in the py.path.svnwc
component of py (aka python-py) could be used by attackers to cause
a compute-time denial of service attack by supplying malicious input
to the blame functionality.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1305-2 ruby2.5 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1305-2-ruby2.5/</link>
      <pubDate>Wed, 12 Feb 2025 23:49:11 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1305-2-ruby2.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1305-2-ruby2.5/">
      
&lt;p&gt;Package : ruby2.5&lt;/p&gt;


&lt;p&gt;Version : 2.5.5-3&amp;#43;deb10u9 (buster)&lt;/p&gt;


      &lt;p&gt;A regression was found in the REXML gem shipped with ruby2.5.&lt;/p&gt;
&lt;p&gt;Some valid XML file were wrongly considered invalid for some namespace
corner case (particularly XML file using the xml: namespace).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1321-1 dcmtk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1321-1-dcmtk/</link>
      <pubDate>Wed, 12 Feb 2025 23:50:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1321-1-dcmtk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1321-1-dcmtk/">
      
&lt;p&gt;Package : dcmtk&lt;/p&gt;


&lt;p&gt;Version : 3.6.1~20160216-4.1&amp;#43;deb9u1 (stretch), 3.6.4-2.1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47796&#34;&gt;CVE-2024-47796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52333&#34;&gt;CVE-2024-52333&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two cases of improper array index validation have been fixed in DCMTK, a collection of libraries and applications implementing large parts the DICOM standard for medical images.&lt;/p&gt;
&lt;p&gt;Additionally, a regression introduced in the previous update has been fixed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1320-1 openjdk-8 new java update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1320-1-openjdk-8/</link>
      <pubDate>Wed, 12 Feb 2025 10:51:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1320-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1320-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u442-ga-1~deb8u1 (jessie), 8u442-ga-1~deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;This update brings OpenJDK 8u442, which comes with stability and bug fixes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1319-1 asterisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1319-1-asterisk/</link>
      <pubDate>Wed, 12 Feb 2025 02:13:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1319-1-asterisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1319-1-asterisk/">
      
&lt;p&gt;Package : asterisk&lt;/p&gt;


&lt;p&gt;Version : 1:13.14.1~dfsg-2&amp;#43;deb9u11 (stretch), 1:16.28.0~dfsg-0&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53566&#34;&gt;CVE-2024-53566&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in asterisk, an Open Source Private Branch
Exchange.&lt;/p&gt;
&lt;p&gt;CVE-2024-53566&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It is possible to access files outside the configuration directory via AMI
and path traversal even when live_dangerously is not enabled.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1318-1 iperf3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1318-1-iperf3/</link>
      <pubDate>Tue, 11 Feb 2025 00:36:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1318-1-iperf3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1318-1-iperf3/">
      
&lt;p&gt;Package : iperf3&lt;/p&gt;


&lt;p&gt;Version : 3.9-1&amp;#43;deb8u1 (jessie), 3.9-1&amp;#43;deb9u1 (stretch), 3.9-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-7250&#34;&gt;CVE-2023-7250&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26306&#34;&gt;CVE-2024-26306&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53580&#34;&gt;CVE-2024-53580&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in iperf3, an internet
protocol bandwidth measuring tool, which may lead to a denial-of-service. When
iperf3 was used as a server with RSA authentication CVE-2024-26306 allowed a
timing side channel attack in RSA decryption operations sufficient for an
attacker to recover credential plaintext.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1317-1 ark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1317-1-ark/</link>
      <pubDate>Sat, 08 Feb 2025 19:53:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1317-1-ark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1317-1-ark/">
      
&lt;p&gt;Package : ark&lt;/p&gt;


&lt;p&gt;Version : 4:18.08.3-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-57966&#34;&gt;CVE-2024-57966&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was discovered in ark, an archive utility for the KDE platform. Ark
extracted archives with absolute paths to the corresponding location on
the user&amp;rsquo;s file system. Absolute paths are now treated as relative paths to
prevent overwriting of sensitive information.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1316-1 git-lfs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1316-1-git-lfs/</link>
      <pubDate>Tue, 04 Feb 2025 13:14:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1316-1-git-lfs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1316-1-git-lfs/">
      
&lt;p&gt;Package : git-lfs&lt;/p&gt;


&lt;p&gt;Version : 2.7.1-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53263&#34;&gt;CVE-2024-53263&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2024-53263&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When Git LFS requests credentials from Git for a remote host, it
passes portions of the host&amp;rsquo;s URL to the &lt;code&gt;git-credential(1)&lt;/code&gt; command
without checking for embedded line-ending control characters, and then
sends any credentials it receives back from the Git credential helper
to the remote host. By inserting URL-encoded control characters such
as line feed (LF) or carriage return (CR) characters into the URL,
an attacker may be able to retrieve a user&amp;rsquo;s Git credentials.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1315-1 sssd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1315-1-sssd/</link>
      <pubDate>Sat, 01 Feb 2025 02:39:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1315-1-sssd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1315-1-sssd/">
      
&lt;p&gt;Package : sssd&lt;/p&gt;


&lt;p&gt;Version : 1.15.0-3&amp;#43;deb9u3 (stretch), 1.16.3-3.2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10852&#34;&gt;CVE-2018-10852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16838&#34;&gt;CVE-2018-16838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3811&#34;&gt;CVE-2019-3811&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3758&#34;&gt;CVE-2023-3758&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2018-10852&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that when SSSD created the UNIX pipe for
communication between sudo and the sssd-sudo responder,
the &lt;code&gt;umask()&lt;/code&gt; call was set to be too permissive, which resulted in
the pipe being readable and writable.  Then, if an attacker used the
same communication protocol that sudo uses to talk to SSSD, they
could obtain the list of sudo rules for any user who stores their
sudo rules in a remote directory.&lt;/p&gt;
&lt;p&gt;While the sudo responder is not started by default by SSSD itself,
utilities like ipa-client-install configure the sudo responder to be
started.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2018-16838&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that when the Group Policy Objects (GPO) are not
readable by SSSD due to a too strict permission settings on the
server side, SSSD allows all authenticated users to login instead of
denying access.&lt;/p&gt;
&lt;p&gt;A new boolean setting &lt;code&gt;ad_gpo_ignore_unreadable&lt;/code&gt; (defaulting to
&lt;code&gt;False&lt;/code&gt;) is introduced for environments where attributes in the
&lt;code&gt;groupPolicyContainer&lt;/code&gt; are not readable and changing the permissions
on the GPO objects is not possible or desirable.  See sssd-ad(5).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2019-3811&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;It was discovered that if a user was configured with no home
directory set, then sssd(8) returns &lt;code&gt;/&lt;/code&gt; (i.e., the root directory)
instead of the empty string (meaning no home directory).  This could
impact services that restrict the user&amp;rsquo;s filesystem access to within
their home directory through &lt;code&gt;chroot()&lt;/code&gt; or similar.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2023-3758&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A race condition flaw was found in SSSD where the GPO policy is not
consistently applied for authenticated users.  This may lead to
improper authorization issues, granting access to resources
inappropriately.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;(sssd 1.16.3-3.2+deb10u3 only fixes CVE-2023-3758 as the previous
version was already immune to the other vulnerabilities.)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1314-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1314-1-ffmpeg/</link>
      <pubDate>Sat, 01 Feb 2025 00:33:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1314-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1314-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35366&#34;&gt;CVE-2024-35366&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35367&#34;&gt;CVE-2024-35367&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36616&#34;&gt;CVE-2024-36616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36617&#34;&gt;CVE-2024-36617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36618&#34;&gt;CVE-2024-36618&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in ffmpeg, a package that contains tools
for transcoding, streaming and playing of multimedia files
Those issues are related to possible integer overflows, double-free on
errors, out-of-bounds access and an incomplete check of negative durations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1313-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1313-1-ffmpeg/</link>
      <pubDate>Sat, 01 Feb 2025 00:28:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1313-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1313-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:4.1.11-0&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35366&#34;&gt;CVE-2024-35366&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35367&#34;&gt;CVE-2024-35367&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35368&#34;&gt;CVE-2024-35368&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36616&#34;&gt;CVE-2024-36616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36617&#34;&gt;CVE-2024-36617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36618&#34;&gt;CVE-2024-36618&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in ffmpeg, a package that contains tools
for transcoding, streaming and playing of multimedia files
Those issues are related to possible integer overflows, double-free on
errors, out-of-bounds access, seeks beyond 64bit and an incomplete
check of negative durations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1312-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1312-1-openjdk-11/</link>
      <pubDate>Fri, 31 Jan 2025 14:41:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1312-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1312-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.26&amp;#43;4-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2025-21502&#34;&gt;CVE-2025-21502&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue was found in the OpenJDK Java runtime, which may result in
unauthorized access.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1311-1 busybox security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1311-1-busybox/</link>
      <pubDate>Fri, 31 Jan 2025 09:25:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1311-1-busybox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1311-1-busybox/">
      
&lt;p&gt;Package : busybox&lt;/p&gt;


&lt;p&gt;Version : 1:1.22.0-9&amp;#43;deb8u6 (jessie), 1:1.22.0-19&amp;#43;deb9u3 (stretch), 1:1.30.1-4&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20679&#34;&gt;CVE-2018-20679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28831&#34;&gt;CVE-2021-28831&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42378&#34;&gt;CVE-2021-42378&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42379&#34;&gt;CVE-2021-42379&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42380&#34;&gt;CVE-2021-42380&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42381&#34;&gt;CVE-2021-42381&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42382&#34;&gt;CVE-2021-42382&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42384&#34;&gt;CVE-2021-42384&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42385&#34;&gt;CVE-2021-42385&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42386&#34;&gt;CVE-2021-42386&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48174&#34;&gt;CVE-2022-48174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42364&#34;&gt;CVE-2023-42364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42365&#34;&gt;CVE-2023-42365&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been found in BusyBox, a lightweight
single-executable containing various Unix utilities, which potentially
allow attackers to cause denial of service, information leakage, or
arbitrary code execution through malformed gzip data, crafted LZMA
input or crafted awk patterns.&lt;/p&gt;
&lt;p&gt;CVE-2018-20679 (Jessie and Stretch only)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in BusyBox before 1.30.0. An out of bounds read
in udhcp components (consumed by the DHCP server, client, and relay)
allows a remote attacker to leak sensitive information from the stack by
sending a crafted DHCP message. This is related to verification in
udhcp_get_option() in networking/udhcp/common.c that 4-byte options are
indeed 4 bytes.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28831 (Buster only)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit
on the huft_build result pointer, with a resultant invalid free or
segmentation fault, via malformed gzip data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42374&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds heap read in Busybox&#39;s unlzma applet leads to
information leak and denial of service when crafted LZMA-compressed
input is decompressed. This can be triggered by any applet/format that
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42378&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
getvar_i function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42379&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
next_input_file function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42380&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
clrvar function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42381&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
hash_init function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42382&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
getvar_s function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42384&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
handle_special function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42385&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
evaluate function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42386&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in Busybox&#39;s awk applet leads to denial of service and
possibly code execution when processing a crafted awk pattern in the
nvalloc function
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48174&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a stack overflow vulnerability in ash.c:6030 in busybox before
1.35. In the environment of Internet of Vehicles, this vulnerability can
be executed from command to arbitrary code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42364&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability in BusyBox v.1.36.1 allows attackers to
cause a denial of service via a crafted awk pattern in the awk.c
evaluate function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42365&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability was discovered in BusyBox v.1.36.1 via a
crafted awk pattern in the awk.c copyvar function.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1310-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1310-1-libreoffice/</link>
      <pubDate>Thu, 30 Jan 2025 22:18:24 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1310-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1310-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:4.3.3-2&amp;#43;deb8u16 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12425&#34;&gt;CVE-2024-12425&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12426&#34;&gt;CVE-2024-12426&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Libreoffice, an office productivity software suite, was affected by two vulnerabilities&lt;/p&gt;
&lt;p&gt;CVE-2024-12425&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Improper Limitation of a Pathname to a Restricted Directory (&#39;Path Traversal&#39;) vulnerability was found
in The Document Foundation LibreOffice and allows Absolute Path Traversal. An attacker can write to arbitrary
locations, albeit suffixed with &amp;quot;.ttf&amp;quot;, by supplying a file in a format that supports embedded font files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-12426&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability
was found in The Document Foundation LibreOffice. URLs could be constructed which expanded environmental
variables or INI file values, so potentially sensitive information could be exfiltrated
to a remote server on opening a document containing such links.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1309-1 libgit2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1309-1-libgit2/</link>
      <pubDate>Thu, 30 Jan 2025 19:44:11 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1309-1-libgit2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1309-1-libgit2/">
      
&lt;p&gt;Package : libgit2&lt;/p&gt;


&lt;p&gt;Version : 0.21.1-3&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-8568&#34;&gt;CVE-2016-8568&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-8569&#34;&gt;CVE-2016-8569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10128&#34;&gt;CVE-2016-10128&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10129&#34;&gt;CVE-2016-10129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8099&#34;&gt;CVE-2018-8099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10887&#34;&gt;CVE-2018-10887&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10888&#34;&gt;CVE-2018-10888&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12278&#34;&gt;CVE-2020-12278&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12279&#34;&gt;CVE-2020-12279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24577&#34;&gt;CVE-2024-24577&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in libgit2.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2016-8568&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;git_commit_message&lt;/code&gt; function in oid.c allows remote attackers
to cause a denial of service (out-of-bounds read) via a cat-file
command with a crafted object file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2016-8569&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;git_oid_nfmt&lt;/code&gt; function in commit.c allows remote attackers to
cause a denial of service (&lt;code&gt;NULL&lt;/code&gt; pointer dereference) via a cat-file
command with a crafted object file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2016-10128&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Buffer overflow in the &lt;code&gt;git_pkt_parse_line&lt;/code&gt; function in
&lt;code&gt;transports/smart_pkt.c&lt;/code&gt; in the Git Smart Protocol support in libgit2
allows remote attackers to have unspecified impact via a crafted
non-flush packet.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2016-10129&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Git Smart Protocol support in libgit2 allows remote attackers
to cause a denial of service (&lt;code&gt;NULL&lt;/code&gt; pointer dereference) via an empty
packet line.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2018-8099&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Incorrect returning of an error code in the &lt;code&gt;index.c:read_entry()&lt;/code&gt;
function leads to a double free in libgit2, which allows an attacker
to cause a denial of service via a crafted repository index file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2018-10887&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unexpected sign extension in &lt;code&gt;git_delta_apply&lt;/code&gt; function in &lt;code&gt;delta.c&lt;/code&gt;
file may lead to an integer overflow which in turn leads to an out of
bound read, allowing to read before the base object. An attacker may
use this flaw to leak memory addresses or cause a Denial of Service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2018-10888&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A missing check in &lt;code&gt;git_delta_apply&lt;/code&gt; function in delta.c file, may
lead to an out-of-bound read while reading a binary delta file. An
attacker may use this flaw to cause a Denial of Service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2020-12278&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;path.c mishandles equivalent filenames that exist because of NTFS
Alternate Data Streams. This may allow remote code execution when
cloning a repository.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2020-12279&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;checkout.c mishandles equivalent filenames that exist because of
NTFS short names. This may allow remote code execution when cloning
a repository&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CVE-2024-24577&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Using crafted inputs to the &lt;code&gt;git_index_add&lt;/code&gt; function could cause
heap corruption, and this had the potential to permit arbitrary
code execution.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1308-1 activemq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1308-1-activemq/</link>
      <pubDate>Thu, 30 Jan 2025 10:00:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1308-1-activemq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1308-1-activemq/">
      
&lt;p&gt;Package : activemq&lt;/p&gt;


&lt;p&gt;Version : 5.6.0&amp;#43;dfsg1-4&amp;#43;deb8u4 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11775&#34;&gt;CVE-2018-11775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13920&#34;&gt;CVE-2020-13920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26117&#34;&gt;CVE-2021-26117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46604&#34;&gt;CVE-2023-46604&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Apache ActiveMQ, a
multi-protocol message broker.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-11775&lt;/p&gt;
&lt;p&gt;TLS hostname verification was missing which could make the client
vulnerable to a MITM attack between a Java application using the
ActiveMQ client and the ActiveMQ server. This is now enabled by
default.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-13920&lt;/p&gt;
&lt;p&gt;Apache ActiveMQ uses LocateRegistry.createRegistry() to create the
JMX RMI registry and binds the server to the &amp;ldquo;jmxrmi&amp;rdquo; entry. It is
possible to connect to the registry without authentication and
call the rebind method to rebind jmxrmi to something else. If an
attacker creates another server to proxy the original, and bound
that, he effectively becomes a man in the middle and is able to
intercept the credentials when an user connects.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-26117&lt;/p&gt;
&lt;p&gt;The optional LDAP login module can be configured to use anonymous
access to the LDAP server. In this case, the anonymous context is
used to verify a valid users password in error, resulting in no
check on the password.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-46604&lt;/p&gt;
&lt;p&gt;The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with
network access to either a Java-based OpenWire broker or client to
run arbitrary shell commands by manipulating serialized class
types in the OpenWire protocol to cause either the client or the
broker (respectively) to instantiate any class on the
classpath.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1307-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1307-1-git/</link>
      <pubDate>Tue, 28 Jan 2025 16:46:04 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1307-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1307-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.1.4-2.1&amp;#43;deb8u15 (jessie), 1:2.11.0-3&amp;#43;deb9u12 (stretch), 1:2.20.1-2&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50349&#34;&gt;CVE-2024-50349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52006&#34;&gt;CVE-2024-52006&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in git, a fast, scalable and
distributed revision control system.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-50349&#34;&gt;CVE-2024-50349&lt;/h3&gt;
&lt;p&gt;When Git asks for credentials via a terminal prompt (i.e. without using any
credential helper), it prints out the host name for which the user is expected
to provide a username and/or a password.  At this stage, any URL-encoded parts
have been decoded already, and are printed verbatim.  This could allow
attackers to craft URLs that contain ANSI escape sequences that the terminal
interpret to confuse users e.g. into providing passwords for trusted Git
hosting sites when in fact they are then sent to untrusted sites that are
under the attacker&amp;rsquo;s control.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-52006&#34;&gt;CVE-2024-52006&lt;/h3&gt;
&lt;p&gt;Git defines a line-based protocol that is used to exchange information between
Git and Git credential helpers.  Some ecosystems (most notably, .NET and
node.js) interpret single Carriage Return characters as newlines, which
renders the protections against CVE-2020-5260 incomplete for credential
helpers that treat Carriage Returns in this way.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1306-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1306-1-python-django/</link>
      <pubDate>Tue, 28 Jan 2025 11:17:55 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1306-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1306-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u18 (jessie), 1:1.10.7-2&amp;#43;deb9u24 (stretch), 1:1.11.29-1&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53907&#34;&gt;CVE-2024-53907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56374&#34;&gt;CVE-2024-56374&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in &lt;a href=&#34;https://www.djangoproject.com/&#34;&gt;Django&lt;/a&gt;,
a Python-based web development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CVE-2024-53907&lt;/code&gt;: Prevent a potential Denial of Service (DoS) attack. The
&lt;code&gt;strip_tags&lt;/code&gt; method and &lt;code&gt;striptags&lt;/code&gt; template filter were subject to a
potential denial-of-service attack via certain inputs containing large
sequences of nested incomplete HTML entities.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CVE-2024-56374&lt;/code&gt;: Prevent another potential Denial of Service (DoS) attack.
Lack of upper-bound limit enforcement in strings passed when performing IPv6
validation could have led to a potential denial-of-service attack. The
&lt;code&gt;clean_ipv6_address&lt;/code&gt; and &lt;code&gt;is_valid_ipv6_address&lt;/code&gt; functions were vulnerable as
was the &lt;code&gt;GenericIPAddressField&lt;/code&gt; form field. The &lt;code&gt;GenericIPAddressField&lt;/code&gt; model
field was not affected.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1305-1 ruby2.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1305-1-ruby2.5/</link>
      <pubDate>Sun, 26 Jan 2025 22:38:31 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1305-1-ruby2.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1305-1-ruby2.5/">
      
&lt;p&gt;Package : ruby2.5&lt;/p&gt;


&lt;p&gt;Version : 2.5.5-3&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35176&#34;&gt;CVE-2024-35176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39908&#34;&gt;CVE-2024-39908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41123&#34;&gt;CVE-2024-41123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41946&#34;&gt;CVE-2024-41946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43398&#34;&gt;CVE-2024-43398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49761&#34;&gt;CVE-2024-49761&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in ruby a popular programming
language.&lt;/p&gt;
&lt;p&gt;CVE-2024-35176&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has a Denial of Service (DoS) vulnerability
when it parses an XML that has many &amp;lt;s in
an attribute value. Those who need to parse
untrusted XMLs may be impacted to this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39908&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some Denial of Service (DoS) vulnerabilities
when it parses an XML that has many specific characters such
as &amp;lt;, 0 and %&amp;gt;. If you need to parse untrusted XMLs,
you many be impacted to these vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem has some Denial of Service (DoS) vulnerabilities
when it parses an XML that has many specific characters
such as whitespace character, &amp;gt;] and ]&amp;gt;.
If you need to parse untrusted XMLs, you may be impacted
to these vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-41946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The REXML gem had a Denial of Service (DoS) vulnerability
when it parses an XML that has many entity expansions
with SAX2 or pull parser API.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43398&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;REXML is an XML toolkit for Ruby.
The REXML gem before 3.3.6 has a Denial of Service (DoS)
vulnerability when it parses an XML that has many deep
elements that have same local name attributes.
If you need to parse untrusted XMLs with tree parser
API like REXML::Document.new, you may be impacted
to this vulnerability. If you use other parser APIs
such as stream parser API and SAX2 parser API,
you are not impacted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-49761&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;REXML is an XML toolkit for Ruby.
The REXML gem before 3.3.9 has a ReDoS vulnerability
when it parses an XML that has many digits between
&amp;amp;# and x...; in a hex numeric character reference (&amp;amp;#x...;)
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1304-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1304-1-postgresql-9.4/</link>
      <pubDate>Sat, 25 Jan 2025 12:25:39 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1304-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1304-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u11 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5870&#34;&gt;CVE-2023-5870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10977&#34;&gt;CVE-2024-10977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10978&#34;&gt;CVE-2024-10978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10979&#34;&gt;CVE-2024-10979&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in PostgreSQL, which may result in
the execution of arbitrary code, privilege escalation, log manipulation, or
denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2023-5870&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in PostgreSQL involving the pg_cancel_backend role that
signals background workers, including the logical replication launcher,
autovacuum workers, and the autovacuum launcher. Successful exploitation
requires a non-core extension with a less-resilient background worker
and would affect that specific background worker only.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10977&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Client use of server error message in PostgreSQL allows a server not
trusted under current SSL or GSS settings to furnish arbitrary non-NUL
bytes to the libpq application. For example, a man-in-the-middle attacker
could send a long error message that a human or screen-scraper user of
psql mistakes for valid query results. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10978&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect privilege assignment in PostgreSQL allows a less-privileged
application user to view or change different rows from those intended. An
attack requires the application to use SET ROLE, SET SESSION
AUTHORIZATION, or an equivalent feature.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10979&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect control of environment variables in PostgreSQL PL/Perl allows
an unprivileged database user to change sensitive process environment
variables (e.g. PATH).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1303-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1303-1-postgresql-9.6/</link>
      <pubDate>Sat, 25 Jan 2025 12:25:29 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1303-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1303-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10976&#34;&gt;CVE-2024-10976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10977&#34;&gt;CVE-2024-10977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10978&#34;&gt;CVE-2024-10978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10979&#34;&gt;CVE-2024-10979&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in PostgreSQL, which may result in
the execution of arbitrary code, privilege escalation, or log manipulation.&lt;/p&gt;
&lt;p&gt;CVE-2024-10976&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incomplete tracking in PostgreSQL of tables with row security allows a
reused query to view or change different rows from those intended. It
leads to potentially incorrect policies being applied in cases where
role-specific policies are used and a given query is planned under one
role and then executed under other roles.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10977&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Client use of server error message in PostgreSQL allows a server not
trusted under current SSL or GSS settings to furnish arbitrary non-NUL
bytes to the libpq application. For example, a man-in-the-middle attacker
could send a long error message that a human or screen-scraper user of
psql mistakes for valid query results. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10978&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect privilege assignment in PostgreSQL allows a less-privileged
application user to view or change different rows from those intended. An
attack requires the application to use SET ROLE, SET SESSION
AUTHORIZATION, or an equivalent feature.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10979&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect control of environment variables in PostgreSQL PL/Perl allows
an unprivileged database user to change sensitive process environment
variables (e.g. PATH).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1302-1 postgresql-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1302-1-postgresql-11/</link>
      <pubDate>Sat, 25 Jan 2025 12:25:21 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1302-1-postgresql-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1302-1-postgresql-11/">
      
&lt;p&gt;Package : postgresql-11&lt;/p&gt;


&lt;p&gt;Version : 11.22-0&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10976&#34;&gt;CVE-2024-10976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10977&#34;&gt;CVE-2024-10977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10978&#34;&gt;CVE-2024-10978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10979&#34;&gt;CVE-2024-10979&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in PostgreSQL, which may result in
the execution of arbitrary code, privilege escalation, or log manipulation.&lt;/p&gt;
&lt;p&gt;CVE-2024-10976&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incomplete tracking in PostgreSQL of tables with row security allows a
reused query to view or change different rows from those intended. It
leads to potentially incorrect policies being applied in cases where
role-specific policies are used and a given query is planned under one
role and then executed under other roles.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10977&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Client use of server error message in PostgreSQL allows a server not
trusted under current SSL or GSS settings to furnish arbitrary non-NUL
bytes to the libpq application. For example, a man-in-the-middle attacker
could send a long error message that a human or screen-scraper user of
psql mistakes for valid query results. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10978&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect privilege assignment in PostgreSQL allows a less-privileged
application user to view or change different rows from those intended. An
attack requires the application to use SET ROLE, SET SESSION
AUTHORIZATION, or an equivalent feature.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10979&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect control of environment variables in PostgreSQL PL/Perl allows
an unprivileged database user to change sensitive process environment
variables (e.g. PATH).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1301-1 rails security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1301-1-rails/</link>
      <pubDate>Fri, 24 Jan 2025 13:32:31 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1301-1-rails/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1301-1-rails/">
      
&lt;p&gt;Package : rails&lt;/p&gt;


&lt;p&gt;Version : 2:4.2.7.1-1&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27777&#34;&gt;CVE-2022-27777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22792&#34;&gt;CVE-2023-22792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22795&#34;&gt;CVE-2023-22795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22796&#34;&gt;CVE-2023-22796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28120&#34;&gt;CVE-2023-28120&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vunerabilities were discovered in rails, the Ruby based server-side
MVC web application framework, which could result in XSS, data disclosure
and open redirect.&lt;/p&gt;
&lt;p&gt;CVE-2022-27777&lt;/p&gt;
&lt;p&gt;A XSS Vulnerability in Action View tag helpers which would allow an attacker
to inject content if able to control input into specific attributes.&lt;/p&gt;
&lt;p&gt;CVE-2023-22792&lt;/p&gt;
&lt;p&gt;A regular expression based DoS vulnerability in Action Dispatch. Specially
crafted cookies, in combination with a specially crafted &lt;code&gt;X_FORWARDED_HOST&lt;/code&gt;
header can cause the regular expression engine to enter a state of
catastrophic backtracking. This can cause the process to use large amounts of
CPU and memory, leading to a possible DoS vulnerability.&lt;/p&gt;
&lt;p&gt;CVE-2023-22795&lt;/p&gt;
&lt;p&gt;A regular expression based DoS vulnerability in Action Dispatch related to the
If-None-Match header. A specially crafted HTTP If-None-Match header can cause
the regular expression engine to enter a state of catastrophic backtracking,
when on a version of Ruby below 3.2.0. This can cause the process to use large
amounts of CPU and memory, leading to a possible DoS vulnerability.&lt;/p&gt;
&lt;p&gt;CVE-2023-22796&lt;/p&gt;
&lt;p&gt;A regular expression based DoS vulnerability in Active Support. A specially
crafted string passed to the underscore method can cause the regular
expression engine to enter a state of catastrophic backtracking. This can
cause the process to use large amounts of CPU and memory, leading to a
possible DoS vulnerability.&lt;/p&gt;
&lt;p&gt;CVE-2023-28120&lt;/p&gt;
&lt;p&gt;A vulnerability in ActiveSupport if the new bytesplice method is called on a
SafeBuffer with untrusted user input.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1300-1 frr security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1300-1-frr/</link>
      <pubDate>Thu, 23 Jan 2025 12:29:54 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1300-1-frr/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1300-1-frr/">
      
&lt;p&gt;Package : frr&lt;/p&gt;


&lt;p&gt;Version : 7.5.1-1.1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55553&#34;&gt;CVE-2024-55553&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In FRR, all routes are re-validated if the total size of an update received via RTR exceeds the internal socket&amp;rsquo;s buffer
size, default 4K on most OSes. An attacker can use this to trigger re-parsing of the RIB for FRR routers using RTR by
causing more than this number of updates during an update interval (usually 30 minutes). Additionally, this effect
regularly occurs organically. Furthermore, an attacker can use this to trigger route validation continuously. Given that
routers with large full tables may need more than 30 minutes to fully re-validate the table, continuous
issuance/withdrawal of large numbers of ROA may be used to impact the route handling performance of all FRR instances
using RPKI globally. Additionally, the re-validation will cause heightened BMP traffic to ingestors.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1299-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1299-1-libreoffice/</link>
      <pubDate>Tue, 21 Jan 2025 15:47:20 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1299-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1299-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3&amp;#43;deb9u6 (stretch), 1:6.1.5-3&amp;#43;deb10u15 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12425&#34;&gt;CVE-2024-12425&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12426&#34;&gt;CVE-2024-12426&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Libreoffice, an office productivity software suite, was affected by two vulnerabilities&lt;/p&gt;
&lt;p&gt;CVE-2024-12425&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Improper Limitation of a Pathname to a Restricted Directory (&#39;Path Traversal&#39;) vulnerability was found
in The Document Foundation LibreOffice and allows Absolute Path Traversal. An attacker can write to arbitrary
locations, albeit suffixed with &amp;quot;.ttf&amp;quot;, by supplying a file in a format that supports embedded font files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-12426&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability
was found in The Document Foundation LibreOffice. URLs could be constructed which expanded environmental
variables or INI file values, so potentially sensitive information could be exfiltrated
to a remote server on opening a document containing such links.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1298-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1298-1-tiff/</link>
      <pubDate>Mon, 20 Jan 2025 17:24:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1298-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1298-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u18 (jessie), 4.0.8-2&amp;#43;deb9u13 (stretch), 4.1.0&amp;#43;git191117-2~deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7006&#34;&gt;CVE-2024-7006&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;NULL pointer dereference in TIFFReadDirectory()/TIFFReadCustomDirectory() has been fixed in tiff, a library and tools providing support for the Tag Image File Format (TIFF).&lt;/p&gt;
&lt;p&gt;Additionally, issues with the earlier fixes for CVE-2023-52356 and CVE-2023-25433 have been resolved.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1297-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1297-1-redis/</link>
      <pubDate>Mon, 20 Jan 2025 17:02:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1297-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1297-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u14 (jessie), 3:3.2.6-3&amp;#43;deb9u14 (stretch), 5:5.0.14-1&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46981&#34;&gt;CVE-2024-46981&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Possible code execution with Lua scripting due to a missing call to the
garbage collector has been fixed in the key–value database Redis.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1296-1 libtar security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1296-1-libtar/</link>
      <pubDate>Mon, 20 Jan 2025 16:21:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1296-1-libtar/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1296-1-libtar/">
      
&lt;p&gt;Package : libtar&lt;/p&gt;


&lt;p&gt;Version : 1.2.20-7&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33643&#34;&gt;CVE-2021-33643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33644&#34;&gt;CVE-2021-33644&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33645&#34;&gt;CVE-2021-33645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33646&#34;&gt;CVE-2021-33646&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in libtar, a library for manipulating tar archives.&lt;/p&gt;
&lt;p&gt;CVE-2021-33643&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;out-of-bounds read in gnu_longlink()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33644&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;out-of-bounds read in gnu_longname()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33645&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;memory leak in th_read()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33646
memory leak in th_read()&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1295-1 hplip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1295-1-hplip/</link>
      <pubDate>Mon, 20 Jan 2025 15:56:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1295-1-hplip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1295-1-hplip/">
      
&lt;p&gt;Package : hplip&lt;/p&gt;


&lt;p&gt;Version : 3.16.11&amp;#43;repack0-3&amp;#43;deb9u1 (stretch), 3.18.12&amp;#43;dfsg0-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-6923&#34;&gt;CVE-2020-6923&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;MDNS buffer issues have been fixed in HPLIP, the HP Linux Imaging and Printing system.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1290-2 rsync regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1290-2-rsync/</link>
      <pubDate>Sun, 19 Jan 2025 19:32:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1290-2-rsync/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1290-2-rsync/">
      
&lt;p&gt;Package : rsync&lt;/p&gt;


&lt;p&gt;Version : 3.1.1-3&amp;#43;deb8u4 (jessie), 3.1.2-1&amp;#43;deb9u5 (stretch), 3.1.3-6&amp;#43;deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;The update for rsync announced in ELA 1290-1 introduced a regression
when using the -H option to preserve hard links. Updated packages are
now available to correct this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1294-1 ucf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1294-1-ucf/</link>
      <pubDate>Thu, 16 Jan 2025 17:03:34 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1294-1-ucf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1294-1-ucf/">
      
&lt;p&gt;Package : ucf&lt;/p&gt;


&lt;p&gt;Version : 3.0030&amp;#43;deb8u1 (jessie), 3.0036&amp;#43;deb9u1 (stretch), 3.0038&amp;#43;nmu1&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;A potential command-injection vulnerability was discovered in ucf, a tool to
preserve user changes to config files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1293-1 tomcat9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1293-1-tomcat9/</link>
      <pubDate>Wed, 15 Jan 2025 22:28:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1293-1-tomcat9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1293-1-tomcat9/">
      
&lt;p&gt;Package : tomcat9&lt;/p&gt;


&lt;p&gt;Version : 9.0.31-1~deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21733&#34;&gt;CVE-2024-21733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38286&#34;&gt;CVE-2024-38286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50379&#34;&gt;CVE-2024-50379&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52316&#34;&gt;CVE-2024-52316&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56337&#34;&gt;CVE-2024-56337&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several problems have been addressed in Tomcat 9, a Java based web server,
servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2024-21733&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Generation of Error Message Containing Sensitive Information vulnerability
in Apache Tomcat.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38286&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache Tomcat, under certain configurations, allows an attacker to cause an
OutOfMemoryError by abusing the TLS handshake process.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-52316&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is
configured to use a custom Jakarta Authentication (formerly JASPIC)
ServerAuthContext component which may throw an exception during the
authentication process without explicitly setting an HTTP status to
indicate failure, the authentication may not fail, allowing the user to
bypass the authentication process. There are no known Jakarta
Authentication components that behave in this way.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-50379 / CVE-2024-56337&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP
compilation in Apache Tomcat permits an RCE on case insensitive file
systems when the default servlet is enabled for write (non-default
configuration).
Some users may need additional configuration to fully mitigate
CVE-2024-50379 depending on which version of Java they are using with
Tomcat. For Debian 10 &amp;quot;buster&amp;quot; the system property
sun.io.useCanonCaches must be explicitly set to false (it defaults to
true). Most Debian users will not be affected because Debian uses case
sensitive file systems by default.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1292-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1292-1-tomcat8/</link>
      <pubDate>Wed, 15 Jan 2025 16:20:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1292-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1292-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.5.54-0&amp;#43;deb9u17 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21733&#34;&gt;CVE-2024-21733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38286&#34;&gt;CVE-2024-38286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52316&#34;&gt;CVE-2024-52316&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several problems have been addressed in Tomcat 8, a Java based web server,
servlet and JSP engine, which may have led to an OutOfMemoryError or the
revelation of sensitive information.&lt;/p&gt;
&lt;p&gt;CVE-2024-21733&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Generation of Error Message Containing Sensitive Information vulnerability
in Apache Tomcat.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38286&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache Tomcat, under certain configurations, allows an attacker to cause an
OutOfMemoryError by abusing the TLS handshake process.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-52316&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is
configured to use a custom Jakarta Authentication (formerly JASPIC)
ServerAuthContext component which may throw an exception during the
authentication process without explicitly setting an HTTP status to
indicate failure, the authentication may not fail, allowing the user to
bypass the authentication process. There are no known Jakarta
Authentication components that behave in this way.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1291-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1291-1-tomcat7/</link>
      <pubDate>Wed, 15 Jan 2025 00:31:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1291-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1291-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23672&#34;&gt;CVE-2024-23672&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A denial-of-service vulnerability was found in Tomcat 7, a Java based web
server, servlet and JSP engine. It was possible for WebSocket clients to keep
WebSocket connections open leading to increased resource consumption.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1290-1 rsync security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1290-1-rsync/</link>
      <pubDate>Tue, 14 Jan 2025 19:51:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1290-1-rsync/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1290-1-rsync/">
      
&lt;p&gt;Package : rsync&lt;/p&gt;


&lt;p&gt;Version : 3.1.1-3&amp;#43;deb8u3 (jessie), 3.1.2-1&amp;#43;deb9u4 (stretch), 3.1.3-6&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12085&#34;&gt;CVE-2024-12085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12086&#34;&gt;CVE-2024-12086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12087&#34;&gt;CVE-2024-12087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12088&#34;&gt;CVE-2024-12088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-12747&#34;&gt;CVE-2024-12747&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in rsync, a fast, versatile,
remote (and local) file-copying tool.&lt;/p&gt;
&lt;p&gt;CVE-2024-12085&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a flaw in
the way rsync compares file checksums, allowing a remote attacker to
trigger an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-12086&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a flaw
which would result in a server leaking contents of an arbitrary file
from the client&#39;s machine.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-12087&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a path
traversal vulnerability in the rsync daemon affecting the
--inc-recursive option, which could allow a server to write files
outside of the client&#39;s intended destination directory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-12088&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Simon Scannell, Pedro Gallegos and Jasiel Spelman reported that when
using the --safe-links option, rsync fails to properly verify if a
symbolic link destination contains another symbolic link with it,
resulting in path traversal and arbitrary file write outside of the
desired directory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-12747&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Aleksei Gorban &amp;quot;loqpa&amp;quot; discovered a race condition when handling
symbolic links resulting in an information leak which may enable
escalation of privileges.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1289-1 python-reportlab security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1289-1-python-reportlab/</link>
      <pubDate>Tue, 14 Jan 2025 17:33:40 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1289-1-python-reportlab/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1289-1-python-reportlab/">
      
&lt;p&gt;Package : python-reportlab&lt;/p&gt;


&lt;p&gt;Version : 3.1.8-3&amp;#43;deb8u3 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19450&#34;&gt;CVE-2019-19450&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28463&#34;&gt;CVE-2020-28463&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2019-19450&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Ravi Prakash Giri discovered a remote code execution vulnerability
via crafted XML document where &lt;code&gt;&amp;lt;unichar code=&amp;quot;&lt;/code&gt; is followed by
arbitrary Python code.&lt;/p&gt;
&lt;p&gt;This issue is similar to &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17626&#34;&gt;CVE-2019-17626&lt;/a&gt;.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2020-28463&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Karan Bamal discovered a Server-side Request Forgery (SSRF)
vulnerability via &lt;code&gt;&amp;lt;img&amp;gt;&lt;/code&gt; tags.  New settings &lt;code&gt;trustedSchemes&lt;/code&gt; and
&lt;code&gt;trustedHosts&lt;/code&gt; have been added as part of the fix/mitigation: they
can be used to specify an explicit allowlist for remote sources.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1288-1 linux-6.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1288-1-linux-6.1/</link>
      <pubDate>Tue, 14 Jan 2025 14:02:17 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1288-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1288-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.119-1~deb9u1 (stretch), 6.1.119-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45888&#34;&gt;CVE-2022-45888&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52812&#34;&gt;CVE-2023-52812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26952&#34;&gt;CVE-2024-26952&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26954&#34;&gt;CVE-2024-26954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35964&#34;&gt;CVE-2024-35964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36244&#34;&gt;CVE-2024-36244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36478&#34;&gt;CVE-2024-36478&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36914&#34;&gt;CVE-2024-36914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36915&#34;&gt;CVE-2024-36915&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36923&#34;&gt;CVE-2024-36923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38540&#34;&gt;CVE-2024-38540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38553&#34;&gt;CVE-2024-38553&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41080&#34;&gt;CVE-2024-41080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42322&#34;&gt;CVE-2024-42322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43868&#34;&gt;CVE-2024-43868&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43904&#34;&gt;CVE-2024-43904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43911&#34;&gt;CVE-2024-43911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44949&#34;&gt;CVE-2024-44949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49950&#34;&gt;CVE-2024-49950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49960&#34;&gt;CVE-2024-49960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49974&#34;&gt;CVE-2024-49974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49986&#34;&gt;CVE-2024-49986&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49991&#34;&gt;CVE-2024-49991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50012&#34;&gt;CVE-2024-50012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50036&#34;&gt;CVE-2024-50036&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50067&#34;&gt;CVE-2024-50067&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50072&#34;&gt;CVE-2024-50072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50126&#34;&gt;CVE-2024-50126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50215&#34;&gt;CVE-2024-50215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50218&#34;&gt;CVE-2024-50218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50229&#34;&gt;CVE-2024-50229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50230&#34;&gt;CVE-2024-50230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50232&#34;&gt;CVE-2024-50232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50233&#34;&gt;CVE-2024-50233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50234&#34;&gt;CVE-2024-50234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50235&#34;&gt;CVE-2024-50235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50236&#34;&gt;CVE-2024-50236&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50237&#34;&gt;CVE-2024-50237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50242&#34;&gt;CVE-2024-50242&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50243&#34;&gt;CVE-2024-50243&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50244&#34;&gt;CVE-2024-50244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50245&#34;&gt;CVE-2024-50245&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50247&#34;&gt;CVE-2024-50247&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50249&#34;&gt;CVE-2024-50249&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50250&#34;&gt;CVE-2024-50250&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50251&#34;&gt;CVE-2024-50251&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50252&#34;&gt;CVE-2024-50252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50255&#34;&gt;CVE-2024-50255&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50256&#34;&gt;CVE-2024-50256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50257&#34;&gt;CVE-2024-50257&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50259&#34;&gt;CVE-2024-50259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50261&#34;&gt;CVE-2024-50261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50262&#34;&gt;CVE-2024-50262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50264&#34;&gt;CVE-2024-50264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50265&#34;&gt;CVE-2024-50265&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50267&#34;&gt;CVE-2024-50267&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50268&#34;&gt;CVE-2024-50268&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50269&#34;&gt;CVE-2024-50269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50271&#34;&gt;CVE-2024-50271&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50272&#34;&gt;CVE-2024-50272&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50273&#34;&gt;CVE-2024-50273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50276&#34;&gt;CVE-2024-50276&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50278&#34;&gt;CVE-2024-50278&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50279&#34;&gt;CVE-2024-50279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50280&#34;&gt;CVE-2024-50280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50282&#34;&gt;CVE-2024-50282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50283&#34;&gt;CVE-2024-50283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50284&#34;&gt;CVE-2024-50284&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50286&#34;&gt;CVE-2024-50286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50287&#34;&gt;CVE-2024-50287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50290&#34;&gt;CVE-2024-50290&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50292&#34;&gt;CVE-2024-50292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50295&#34;&gt;CVE-2024-50295&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50296&#34;&gt;CVE-2024-50296&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50299&#34;&gt;CVE-2024-50299&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50301&#34;&gt;CVE-2024-50301&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-50302&#34;&gt;CVE-2024-50302&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53042&#34;&gt;CVE-2024-53042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53043&#34;&gt;CVE-2024-53043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53052&#34;&gt;CVE-2024-53052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53055&#34;&gt;CVE-2024-53055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53057&#34;&gt;CVE-2024-53057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53058&#34;&gt;CVE-2024-53058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53059&#34;&gt;CVE-2024-53059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53060&#34;&gt;CVE-2024-53060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53061&#34;&gt;CVE-2024-53061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53063&#34;&gt;CVE-2024-53063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53066&#34;&gt;CVE-2024-53066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53070&#34;&gt;CVE-2024-53070&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53072&#34;&gt;CVE-2024-53072&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53081&#34;&gt;CVE-2024-53081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53082&#34;&gt;CVE-2024-53082&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53088&#34;&gt;CVE-2024-53088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53093&#34;&gt;CVE-2024-53093&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that may
lead to privilege escalation, denial of service or information leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1287-1 python-tornado security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1287-1-python-tornado/</link>
      <pubDate>Sat, 11 Jan 2025 17:20:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1287-1-python-tornado/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1287-1-python-tornado/">
      
&lt;p&gt;Package : python-tornado&lt;/p&gt;


&lt;p&gt;Version : 4.4.3-1&amp;#43;deb9u1 (stretch), 5.1.1-4&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28370&#34;&gt;CVE-2023-28370&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52804&#34;&gt;CVE-2024-52804&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in python-tornado, a scalable,
non-blocking Python web framework and asynchronous networking library.&lt;/p&gt;
&lt;p&gt;CVE-2023-28370&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An open redirect vulnerability in Tornado versions 6.3.1 and earlier allows
a remote unauthenticated attacker to redirect a user to an arbitrary web
site and conduct a phishing attack by having the user access a specially
crafted URL.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-52804&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The algorithm used for parsing HTTP cookies in Tornado versions prior to
6.4.2 sometimes has quadratic complexity, leading to excessive CPU
consumption when parsing maliciously-crafted cookie headers. This
parsing occurs in the event loop thread and may block the processing of
other requests.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1286-1 sympa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1286-1-sympa/</link>
      <pubDate>Mon, 06 Jan 2025 11:15:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1286-1-sympa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1286-1-sympa/">
      
&lt;p&gt;Package : sympa&lt;/p&gt;


&lt;p&gt;Version : 6.2.40~dfsg-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-55919&#34;&gt;CVE-2024-55919&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in Sympa&amp;rsquo;s web interface, a modern mailing list
manager. An attacker may bypass authentication by using an arbitrary e-mail
address when the generic SSO loging feature was enabled.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1285-1 ca-certificates-java bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1285-1-ca-certificates-java/</link>
      <pubDate>Fri, 03 Jan 2025 12:27:48 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1285-1-ca-certificates-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1285-1-ca-certificates-java/">
      
&lt;p&gt;Package : ca-certificates-java&lt;/p&gt;


&lt;p&gt;Version : 20190405&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;ca-certificate-java, a package that update the cacerts keystore
(a collection of trusted certificate authority certificates) used for many java runtimes,
failed to install.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1284-1 fastnetmon security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1284-1-fastnetmon/</link>
      <pubDate>Mon, 30 Dec 2024 13:25:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1284-1-fastnetmon/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1284-1-fastnetmon/">
      
&lt;p&gt;Package : fastnetmon&lt;/p&gt;


&lt;p&gt;Version : 1.1.3&amp;#43;dfsg-8.1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-56073&#34;&gt;CVE-2024-56073&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential security issue has been discovered in FastNetMon, a fast DDoS
analyzer: Malformed Netflow traffic could result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1283-1 gst-plugins-base0.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1283-1-gst-plugins-base0.10/</link>
      <pubDate>Sun, 29 Dec 2024 11:08:47 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1283-1-gst-plugins-base0.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1283-1-gst-plugins-base0.10/">
      
&lt;p&gt;Package : gst-plugins-base0.10&lt;/p&gt;


&lt;p&gt;Version : 0.10.36-2&amp;#43;deb8u5 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47541&#34;&gt;CVE-2024-47541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47542&#34;&gt;CVE-2024-47542&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47615&#34;&gt;CVE-2024-47615&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;gstreamer a multimedia framework was affected by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2024-47541&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out of Bound write vulnerability has been
identified in the gst_ssa_parse_remove_override_codes
function of the gstssaparse.c file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47542&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A null pointer dereference has been
discovered in the id3v2_read_synch_uint function, located
in id3v2.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47615&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out Of Bound Write has been detected
in the function gst_parse_vorbis_setup_packet within
vorbis_parse.c.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1282-1 gst-plugins-base1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1282-1-gst-plugins-base1.0/</link>
      <pubDate>Sat, 28 Dec 2024 21:19:33 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1282-1-gst-plugins-base1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1282-1-gst-plugins-base1.0/">
      
&lt;p&gt;Package : gst-plugins-base1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u6 (jessie), 1.10.4-1&amp;#43;deb9u5 (stretch), 1.14.4-2&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47538&#34;&gt;CVE-2024-47538&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47541&#34;&gt;CVE-2024-47541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47542&#34;&gt;CVE-2024-47542&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47600&#34;&gt;CVE-2024-47600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47607&#34;&gt;CVE-2024-47607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47615&#34;&gt;CVE-2024-47615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47835&#34;&gt;CVE-2024-47835&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;gstreamer a multimedia framework was affected by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2024-47538&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A stack-buffer overflow has been detected
in the `vorbis_handle_identification_packet`
function within `gstvorbisdec.c`
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47541&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out of Bound write vulnerability has been
identified in the gst_ssa_parse_remove_override_codes
function of the gstssaparse.c file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47542&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A null pointer dereference has been
discovered in the id3v2_read_synch_uint function, located
in id3v2.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47600&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out of Bound read vulnerability has been
detected in the format_channel_mask function in
gst-discoverer.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47607&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A stack-buffer overflow has been
detected in the gst_opus_dec_parse_header function
within `gstopusdec.c&#39;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47615&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out Of Bound Write has been detected
in the function gst_parse_vorbis_setup_packet within
vorbis_parse.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-47835&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A null pointer dereference vulnerability
has been detected in the parse_lrc function within
gstsubparse.c
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1281-1 gstreamer1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1281-1-gstreamer1.0/</link>
      <pubDate>Fri, 27 Dec 2024 10:29:36 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1281-1-gstreamer1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1281-1-gstreamer1.0/">
      
&lt;p&gt;Package : gstreamer1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u2 (jessie), 1.10.4-1&amp;#43;deb9u1 (stretch), 1.14.4-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47606&#34;&gt;CVE-2024-47606&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;gstreamer a multimedia framework was affected by a vulnerability.&lt;/p&gt;
&lt;p&gt;The vulnerability occurs due to an underflow of the &lt;code&gt;gint&lt;/code&gt; &lt;code&gt;size&lt;/code&gt; variable, which causes
&lt;code&gt;size&lt;/code&gt; to hold a large unintended value when cast to an unsigned integer.
This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a
call to &lt;code&gt;gst_buffer_new_and_alloc&lt;/code&gt;.
The function &lt;code&gt;gst_buffer_new_allocate&lt;/code&gt; then attempts to allocate memory, eventually
calling &lt;code&gt;_sysmem_new_block&lt;/code&gt;.
The function &lt;code&gt;_sysmem_new_block&lt;/code&gt; adds alignment and header size to the (unsigned) size,
causing the overflow of the &amp;lsquo;&lt;code&gt;slice_size&lt;/code&gt;&amp;rsquo; variable.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1280-1 amavisd-new security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1280-1-amavisd-new/</link>
      <pubDate>Thu, 26 Dec 2024 20:52:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1280-1-amavisd-new/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1280-1-amavisd-new/">
      
&lt;p&gt;Package : amavisd-new&lt;/p&gt;


&lt;p&gt;Version : 1:2.10.1-4&amp;#43;deb9u1 (stretch), 1:2.11.0-6.1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28054&#34;&gt;CVE-2024-28054&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Amavis has an interpretation conflict when there are ambiguous
boundary delimiters in a MIME email message. An attacker can send
crafted emails that avoid checks for banned files or malware.&lt;/p&gt;
&lt;p&gt;Amavis now treats such emails as UNCHECKED, and this new behavior can
be configured, see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://gitlab.com/amavis/amavis/-/blob/v2.12.3/RELEASE_NOTES&#34;&gt;https://gitlab.com/amavis/amavis/-/blob/v2.12.3/RELEASE_NOTES&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://gitlab.com/amavis/amavis/-/blob/v2.12.3/README_FILES/README.CVE-2024-28054&#34;&gt;https://gitlab.com/amavis/amavis/-/blob/v2.12.3/README_FILES/README.CVE-2024-28054&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1279-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1279-1-php5/</link>
      <pubDate>Thu, 26 Dec 2024 15:12:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1279-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1279-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u22 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8929&#34;&gt;CVE-2024-8929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8932&#34;&gt;CVE-2024-8932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11233&#34;&gt;CVE-2024-11233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11234&#34;&gt;CVE-2024-11234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11236&#34;&gt;CVE-2024-11236&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2024-8929&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Sébastien Rolland discovered a partial content leak of the heap
through heap buffer over-read in mysqlnd.&lt;/p&gt;
&lt;p&gt;By connecting to a fake MySQL server or tampering with network
packets and initiating a SQL Query, it is possible to abuse
&lt;code&gt;php_mysqlnd_rset_field_read()&lt;/code&gt; when parsing MySQL fields packets in
order to include the rest of the heap content starting from the
address of the cursor of the currently read buffer.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-8932&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Yiheng Cao discovered that uncontrolled long string inputs to
&lt;code&gt;ldap_escape()&lt;/code&gt; on 32-bit systems can cause an integer overflow,
resulting in an out-of-bounds write.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11233&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A memory-related vulnerability was discovered in the filter handling
system, particularly when processing input with
&lt;code&gt;convert.quoted-printable-decode&lt;/code&gt; filters, which could lead to a
segmentation fault.&lt;/p&gt;
&lt;p&gt;This vulnerability is triggered through specific sequences of input
data, causing PHP to crash.  When exploited, it allows an attacker
to extract a single byte of data from the heap or result in denial
of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11234&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Lorenzo Leonardini discovered that Configuring a proxy in a stream
context might allow for CRLF injection in URIs, which could lead to
authorization bypass by Server Side Request Forgery attack (SSRF).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11236&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;An integer overflow vulnerability was found in the firebird and
dblib quoters, which can result in out-of-bounds writes.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;GHSA-4w77-75f9-2c8w&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A heap-use-after-free vulnerability was discovered in the
&lt;code&gt;sapi_read_post_data()&lt;/code&gt; function, which could allow an attacker to
exploit memory safety issues during &lt;code&gt;POST&lt;/code&gt; request processing.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;In addition, this releases fixes a segfault on &lt;code&gt;close()&lt;/code&gt; after
&lt;code&gt;free_result()&lt;/code&gt; with mysqlnd, which wasn&amp;rsquo;t assigned an advisory number.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1278-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1278-1-php7.0/</link>
      <pubDate>Thu, 26 Dec 2024 15:12:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1278-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1278-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u20 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8929&#34;&gt;CVE-2024-8929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8932&#34;&gt;CVE-2024-8932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11233&#34;&gt;CVE-2024-11233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11234&#34;&gt;CVE-2024-11234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11236&#34;&gt;CVE-2024-11236&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2024-8929&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Sébastien Rolland discovered a partial content leak of the heap
through heap buffer over-read in mysqlnd.&lt;/p&gt;
&lt;p&gt;By connecting to a fake MySQL server or tampering with network
packets and initiating a SQL Query, it is possible to abuse
&lt;code&gt;php_mysqlnd_rset_field_read()&lt;/code&gt; when parsing MySQL fields packets in
order to include the rest of the heap content starting from the
address of the cursor of the currently read buffer.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-8932&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Yiheng Cao discovered that uncontrolled long string inputs to
&lt;code&gt;ldap_escape()&lt;/code&gt; on 32-bit systems can cause an integer overflow,
resulting in an out-of-bounds write.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11233&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A memory-related vulnerability was discovered in the filter handling
system, particularly when processing input with
&lt;code&gt;convert.quoted-printable-decode&lt;/code&gt; filters, which could lead to a
segmentation fault.&lt;/p&gt;
&lt;p&gt;This vulnerability is triggered through specific sequences of input
data, causing PHP to crash.  When exploited, it allows an attacker
to extract a single byte of data from the heap or result in denial
of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11234&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Lorenzo Leonardini discovered that Configuring a proxy in a stream
context might allow for CRLF injection in URIs, which could lead to
authorization bypass by Server Side Request Forgery attack (SSRF).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11236&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;An integer overflow vulnerability was found in the firebird and
dblib quoters, which can result in out-of-bounds writes.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;GHSA-4w77-75f9-2c8w&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A heap-use-after-free vulnerability was discovered in the
&lt;code&gt;sapi_read_post_data()&lt;/code&gt; function, which could allow an attacker to
exploit memory safety issues during &lt;code&gt;POST&lt;/code&gt; request processing.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1277-1 php7.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1277-1-php7.3/</link>
      <pubDate>Thu, 26 Dec 2024 15:12:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1277-1-php7.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1277-1-php7.3/">
      
&lt;p&gt;Package : php7.3&lt;/p&gt;


&lt;p&gt;Version : 7.3.31-1~deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8929&#34;&gt;CVE-2024-8929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8932&#34;&gt;CVE-2024-8932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11233&#34;&gt;CVE-2024-11233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11234&#34;&gt;CVE-2024-11234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11236&#34;&gt;CVE-2024-11236&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;dl&gt;
&lt;dt&gt;CVE-2024-8929&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Sébastien Rolland discovered a partial content leak of the heap
through heap buffer over-read in mysqlnd.&lt;/p&gt;
&lt;p&gt;By connecting to a fake MySQL server or tampering with network
packets and initiating a SQL Query, it is possible to abuse
&lt;code&gt;php_mysqlnd_rset_field_read()&lt;/code&gt; when parsing MySQL fields packets in
order to include the rest of the heap content starting from the
address of the cursor of the currently read buffer.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-8932&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Yiheng Cao discovered that uncontrolled long string inputs to
&lt;code&gt;ldap_escape()&lt;/code&gt; on 32-bit systems can cause an integer overflow,
resulting in an out-of-bounds write.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11233&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A memory-related vulnerability was discovered in the filter handling
system, particularly when processing input with
&lt;code&gt;convert.quoted-printable-decode&lt;/code&gt; filters, which could lead to a
segmentation fault.&lt;/p&gt;
&lt;p&gt;This vulnerability is triggered through specific sequences of input
data, causing PHP to crash.  When exploited, it allows an attacker
to extract a single byte of data from the heap or result in denial
of service.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11234&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;Lorenzo Leonardini discovered that Configuring a proxy in a stream
context might allow for CRLF injection in URIs, which could lead to
authorization bypass by Server Side Request Forgery attack (SSRF).&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;CVE-2024-11236&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;An integer overflow vulnerability was found in the firebird and
dblib quoters, which can result in out-of-bounds writes.&lt;/p&gt;
&lt;/dd&gt;
&lt;dt&gt;GHSA-4w77-75f9-2c8w&lt;/dt&gt;
&lt;dd&gt;
&lt;p&gt;A heap-use-after-free vulnerability was discovered in the
&lt;code&gt;sapi_read_post_data()&lt;/code&gt; function, which could allow an attacker to
exploit memory safety issues during &lt;code&gt;POST&lt;/code&gt; request processing.&lt;/p&gt;
&lt;/dd&gt;
&lt;/dl&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1276-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1276-1-intel-microcode/</link>
      <pubDate>Mon, 23 Dec 2024 20:33:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1276-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1276-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20241112.1~deb8u1 (jessie), 3.20241112.1~deb9u1 (stretch), 3.20241112.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21820&#34;&gt;CVE-2024-21820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21853&#34;&gt;CVE-2024-21853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23918&#34;&gt;CVE-2024-23918&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23984&#34;&gt;CVE-2024-23984&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A microcode update has been released for Intel processors, addressing multiple
vulnerabilties which potentially could cause local privileged escalation or
local DoS.&lt;/p&gt;
&lt;p&gt;CVE-2024-21820&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect default permissions in some Intel(R) Xeon(R) processor memory
controller configurations when using Intel(R) SGX may allow a privileged user
to potentially enable escalation of privilege via local access.
(INTEL-SA-01079)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-21853&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th
Generation Intel(R) Xeon(R) Processors may allow an authorized user to
potentially enable denial of service via local access. (INTEL-SA-01101)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-23918&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper conditions check in some Intel(R) Xeon(R) processor memory controller
configurations when using Intel(R) SGX may allow a privileged user to
potentially enable escalation of privilege via local access. (INTEL-SA-01079)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-23984 (already adressed in a previous upload, this upload adds more processor models.)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Observable discrepancy in RAPL interface for some Intel(R) Processors may allow
a privileged user to potentially enable information disclosure via local
access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1275-1 libpgjava regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1275-1-libpgjava/</link>
      <pubDate>Fri, 20 Dec 2024 08:17:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1275-1-libpgjava/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1275-1-libpgjava/">
      
&lt;p&gt;Package : libpgjava&lt;/p&gt;


&lt;p&gt;Version : 42.2.5-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


      &lt;p&gt;A regression in PgResultSet.refreshRow() introduced by the CVE-2022-31197 fix in 42.2.5-2+deb10u2 has been fixed in the PostgreSQL JDBC Driver.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1274-1 astropy bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1274-1-astropy/</link>
      <pubDate>Fri, 20 Dec 2024 08:12:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1274-1-astropy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1274-1-astropy/">
      
&lt;p&gt;Package : astropy&lt;/p&gt;


&lt;p&gt;Version : 3.1.2-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;Due to an issue unrelated to the DLA changes, the DLA-3803-1 update of astropy (an Astronomy package for Python) containing the CVE-2023-41334 fix had bever been successfully built.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1273-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1273-1-zabbix/</link>
      <pubDate>Sun, 15 Dec 2024 16:25:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1273-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1273-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u9 (jessie), 1:3.0.32&amp;#43;dfsg-0&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22117&#34;&gt;CVE-2024-22117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36464&#34;&gt;CVE-2024-36464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42332&#34;&gt;CVE-2024-42332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42333&#34;&gt;CVE-2024-42333&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a network
monitoring solution, potentially among other effects allowing denial of
service, information disclosure, log tampering or buffer over-read.&lt;/p&gt;
&lt;p&gt;CVE-2024-22117&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When a URL is added to the map element, it is recorded in the database
with sequential IDs. Upon adding a new URL, the system retrieves the
last sysmapelementurlid value and increments it by one. However, an
issue arises when a user manually changes the sysmapelementurlid value
by adding sysmapelementurlid + 1. This action prevents others from
adding URLs to the map element.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-36464&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When exporting media types, the password is exported in the YAML in
plain text. This appears to be a best practices type issue and may
have no actual impact. The user would need to have permissions to
access the media types and therefore would be expected to have
access to these passwords.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42332&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The researcher is showing that due to the way the SNMP trap log is
parsed, an attacker can craft an SNMP trap with additional lines of
information and have forged data show in the Zabbix UI. This attack
requires SNMP auth to be off and/or the attacker to know the
community/auth details. The attack requires an SNMP item to be
configured as text on the target host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42333&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The researcher is showing that it is possible to leak a small amount
of Zabbix Server memory using an out of bounds read in
src/libs/zbxmedia/email.c
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1272-1 libsoup2.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1272-1-libsoup2.4/</link>
      <pubDate>Thu, 12 Dec 2024 20:25:42 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1272-1-libsoup2.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1272-1-libsoup2.4/">
      
&lt;p&gt;Package : libsoup2.4&lt;/p&gt;


&lt;p&gt;Version : 2.48.0-1&amp;#43;deb8u3 (jessie), 2.56.0-2&amp;#43;deb9u3 (stretch), 2.64.2-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52530&#34;&gt;CVE-2024-52530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52531&#34;&gt;CVE-2024-52531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52532&#34;&gt;CVE-2024-52532&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in libsoup2.4, an HTTP library
for Gtk+ programs.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-52530&#34;&gt;CVE-2024-52530&lt;/h3&gt;
&lt;p&gt;In some configurations, HTTP request smuggling is possible because null
characters at the end of the names of HTTP headers were ignored.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-52531&#34;&gt;CVE-2024-52531&lt;/h3&gt;
&lt;p&gt;There was a buffer overflow in applications that perform conversion to
UTF-8 in &lt;code&gt;soup_header_parse_param_list_strict&lt;/code&gt;.  This could lead to memory
corruption, crashes or information disclosure.  (Contrary to the CVE
description, it is now believed that input received over the network could
trigger this.)&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-52532&#34;&gt;CVE-2024-52532&lt;/h3&gt;
&lt;p&gt;An infinite loop in the processing of WebSocket data from clients could
lead to a denial-of-service problem through memory exhaustion.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1271-1 linux-6.1 new linux version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1271-1-linux-6.1/</link>
      <pubDate>Thu, 12 Dec 2024 12:29:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1271-1-linux-6.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1271-1-linux-6.1/">
      
&lt;p&gt;Package : linux-6.1&lt;/p&gt;


&lt;p&gt;Version : 6.1.112-1~deb9u1 (stretch), 6.1.112-1~deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;This update introduces Linux kernel 6.1 to Debian 9 stretch and Debian 10 buster.
This kernel will be supported along with 5.10, but for a longer period. Linux 4.19
was discontinued as announced in &lt;a href=&#34;https://deb.freexian.com/extended-lts/updates/ela-1116-1-linux-4.19/&#34;&gt;ELA-1116-1&lt;/a&gt;.
Instructions on how to update to 6.1 and support periods can be found
&lt;a href=&#34;https://deb.freexian.com/extended-lts/docs/kernel-backport/&#34;&gt;in the kernel backports page&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1270-1 ntp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1270-1-ntp/</link>
      <pubDate>Wed, 11 Dec 2024 12:28:41 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1270-1-ntp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1270-1-ntp/">
      
&lt;p&gt;Package : ntp&lt;/p&gt;


&lt;p&gt;Version : 1:4.2.8p12&amp;#43;dfsg-4&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11868&#34;&gt;CVE-2020-11868&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15025&#34;&gt;CVE-2020-15025&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26555&#34;&gt;CVE-2023-26555&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in ntp, a Network Time Protocol
daemon and set of utility programs.&lt;/p&gt;
&lt;h3 id=&#34;cve-2020-11868&#34;&gt;CVE-2020-11868&lt;/h3&gt;
&lt;p&gt;It was possible for an off-path attacker to block unauthenticated
synchronisation via a server mode packet with a spoofed source IP address.&lt;/p&gt;
&lt;h3 id=&#34;cve-2020-15025&#34;&gt;CVE-2020-15025&lt;/h3&gt;
&lt;p&gt;A remote attacker could cause a denial-of-service because of a memory leak in
situations where a CMAC key is used and associated with a CMAC algorithm in
the ntp.keys file.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-26555&#34;&gt;CVE-2023-26555&lt;/h3&gt;
&lt;p&gt;The clock driver for the Trimble Palisade GPS timing receiver contained an
out-of-bounds write, which could cause memory corruption or a crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1269-1 avahi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1269-1-avahi/</link>
      <pubDate>Mon, 09 Dec 2024 14:37:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1269-1-avahi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1269-1-avahi/">
      
&lt;p&gt;Package : avahi&lt;/p&gt;


&lt;p&gt;Version : 0.6.31-5&amp;#43;deb8u3 (jessie), 0.6.32-2&amp;#43;deb9u3 (stretch), 0.7-4&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38469&#34;&gt;CVE-2023-38469&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38470&#34;&gt;CVE-2023-38470&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38471&#34;&gt;CVE-2023-38471&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38472&#34;&gt;CVE-2023-38472&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38473&#34;&gt;CVE-2023-38473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the service discovery system Avahi.&lt;/p&gt;
&lt;p&gt;Additionally, a GetAlternativeServiceName regression introduced by the CVE-2023-1981 fix in DLA-3414-1 (buster) and ELA-844-1 (jessie, stretch) has been fixed.&lt;/p&gt;
&lt;p&gt;CVE-2023-38469&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reachable assertion in avahi_dns_packet_append_record
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38470&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reachable assertion in avahi_escape_label
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38471&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reachable assertion in dbus_set_host_name
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38472&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reachable assertion in avahi_rdata_parse
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38473&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reachable assertion in avahi_alternative_host_name
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1268-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1268-1-clamav/</link>
      <pubDate>Wed, 04 Dec 2024 19:36:21 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1268-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1268-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.103.12&amp;#43;dfsg-0&amp;#43;deb8u1 (jessie), 0.103.12&amp;#43;dfsg-0&amp;#43;deb9u1 (stretch), 1.0.7&amp;#43;dfsg-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20505&#34;&gt;CVE-2024-20505&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20506&#34;&gt;CVE-2024-20506&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were found in ClamAV, an antivirus toolkit for Unix.&lt;/p&gt;
&lt;p&gt;CVE-2024-20505&lt;/p&gt;
&lt;p&gt;Affected versions could allow an unauthenticated, remote attacker to cause a
denial of service (DoS) condition on an affected device. The vulnerability is
due to an out of bounds read. An attacker could exploit this vulnerability by
submitting a crafted PDF file to be scanned by ClamAV on an affected device. An
exploit could allow the attacker to terminate the scanning process.&lt;/p&gt;
&lt;p&gt;CVE-2024-20506&lt;/p&gt;
&lt;p&gt;Affected versions could allow an authenticated, local attacker to corrupt
critical system files. The vulnerability is due to allowing the ClamD process
to write to its log file while privileged without checking if the logfile has
been replaced with a symbolic link. An attacker could exploit this
vulnerability if they replace the ClamD log file with a symlink to a critical
system file and then find a way to restart the ClamD process. An exploit could
allow the attacker to corrupt a critical system file by appending ClamD log
messages after restart.&lt;/p&gt;
&lt;p&gt;On Debian 10 (Buster), clamav was updated to version 1.0.7+dfsg-1~deb10u1. In
order to properly built it, new source packages and their binaries were
introduced to Debian 10 (Buster):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;cmake-latest/3.18.4-2~deb10u1&lt;/li&gt;
&lt;li&gt;llvm-toolchain-16/1:16.0.6-15~deb10u1&lt;/li&gt;
&lt;li&gt;rustc-web/1.78.0+dfsg1-2~deb10u1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Due to the library soname bump, the reverse dependencies of libclamav9 were
also rebuilt against libclamav11. The following source packages were updated:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;c-icap-modules/1:0.5.3-1+deb10u2&lt;/li&gt;
&lt;li&gt;cyrus-imapd/3.0.8-6+deb10u7&lt;/li&gt;
&lt;li&gt;havp/0.93-2+deb10u1&lt;/li&gt;
&lt;li&gt;pg-snakeoil/1.1-1+deb10u1&lt;/li&gt;
&lt;li&gt;python-clamav/0.4.1-11+deb10u1&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1267-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1267-1-python3.4/</link>
      <pubDate>Tue, 03 Dec 2024 18:35:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1267-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1267-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u19 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9287&#34;&gt;CVE-2024-9287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in python3.4, an interactive high-level
object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2023-27043:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module of Python
incorrectly parsed e-mail addresses that contain
a special character. The wrong portion of an
RFC2822 header was identified as the value of the addr-spec.
In some applications, an attacker could bypass a protection
mechanism in which application access is granted only after
verifying receipt of e-mail to a specific domain (e.g.,
only @company.example.com addresses may be used for signup).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6232:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Regular expressions that allowed excessive
backtracking during tarfile.TarFile header parsing were vulnerable
to ReDoS via specifically-crafted tar archives.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6923&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module didn’t properly quote
newlines for email headers when serializing an email message,
allowing for header injection when an email is serialized.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-7592&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When parsing cookies that contained
backslashes for quoted characters in the cookie value,
the parser would use an algorithm with quadratic complexity,
resulting in excess CPU resources being used while parsing
the value
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-9287&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability has been found in the `venv`
module and CLI where path names provided when creating a
virtual environment were not quoted properly, allowing the
creator to inject commands into virtual environment &amp;quot;activation&amp;quot;
scripts (ie &amp;quot;source venv/bin/activate&amp;quot;).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-11168&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The urllib.parse.urlsplit() and urlparse()
functions improperly validated bracketed hosts (`[]`),
allowing hosts that weren&#39;t IPv6 or IPvFuture. This behavior
was not conformant to RFC 3986 and potentially enabled SSRF
if a URL is processed by more than one URL parser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1266-1 simplesamlphp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1266-1-simplesamlphp/</link>
      <pubDate>Tue, 03 Dec 2024 12:01:32 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1266-1-simplesamlphp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1266-1-simplesamlphp/">
      
&lt;p&gt;Package : simplesamlphp&lt;/p&gt;


&lt;p&gt;Version : 1.16.3-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52596&#34;&gt;CVE-2024-52596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52806&#34;&gt;CVE-2024-52806&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that in SimpleSAMLphp, an implementation of the SAML 2.0
protocol, is prone to XML external entity (XXE) vulnerabilities when loading
(untrusted) XML documents or parsing SAML messages.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1238-2 needrestart regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1238-2-needrestart/</link>
      <pubDate>Mon, 02 Dec 2024 21:55:26 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1238-2-needrestart/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1238-2-needrestart/">
      
&lt;p&gt;Package : needrestart&lt;/p&gt;


&lt;p&gt;Version : 1.2-8&amp;#43;deb8u4 (jessie), 2.11-3&amp;#43;deb9u4 (stretch), 3.4-5&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48991&#34;&gt;CVE-2024-48991&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The update for needrestart announced as ELA 1228-1 introduced a
regression, reporting false positives for processes running in chroot or
mountns. Updated packages are now available to correct this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1265-1 mariadb-10.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1265-1-mariadb-10.1/</link>
      <pubDate>Sun, 01 Dec 2024 10:29:50 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1265-1-mariadb-10.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1265-1-mariadb-10.1/">
      
&lt;p&gt;Package : mariadb-10.1&lt;/p&gt;


&lt;p&gt;Version : 10.1.48-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38791&#34;&gt;CVE-2022-38791&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A Denial-of-service vulnerability was found in MariaDB, a popular database
server.
It was found that the mariabackup tool did not correctly handle a mutex
primitive, making it possible for local users to trigger a deadlock.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1264-1 openssl1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1264-1-openssl1.0/</link>
      <pubDate>Sun, 01 Dec 2024 10:32:47 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1264-1-openssl1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1264-1-openssl1.0/">
      
&lt;p&gt;Package : openssl1.0&lt;/p&gt;


&lt;p&gt;Version : 1.0.2u-1~deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5678&#34;&gt;CVE-2023-5678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0727&#34;&gt;CVE-2024-0727&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets Layer
toolkit.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-5678&#34;&gt;CVE-2023-5678&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with excessively long X9.42 DH keys.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-0727&#34;&gt;CVE-2024-0727&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with a null field in a PKCS12 file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1263-1 lemonldap-ng security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1263-1-lemonldap-ng/</link>
      <pubDate>Sat, 30 Nov 2024 22:25:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1263-1-lemonldap-ng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1263-1-lemonldap-ng/">
      
&lt;p&gt;Package : lemonldap-ng&lt;/p&gt;


&lt;p&gt;Version : 2.0.2&amp;#43;ds-7&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48933&#34;&gt;CVE-2024-48933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52947&#34;&gt;CVE-2024-52947&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two Cross-site scripting (XSS) vulnerabilities were discovered in
Lemonldap::NG, an OpenID-Connect, CAS and SAML compatible Web-SSO
system, which could lead to injection of arbitrary scripts or HTML
content.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-48933: XSS vulnerability which allows remote attackers to
inject arbitrary web script or HTML into the login page via a
username if &lt;code&gt;userControl&lt;/code&gt; has been set to a non-default value that
allows special HTML characters.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-52947: XSS vulnerability which allows remote attackers to
inject arbitrary web script or HTML via the &lt;code&gt;url&lt;/code&gt; parameter of the
upgrade session confirmation page (&lt;code&gt;upgradeSession&lt;/code&gt;) if the &amp;ldquo;Upgrade
session&amp;rdquo; plugin has been enabled by an admin.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1262-1 python3.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1262-1-python3.5/</link>
      <pubDate>Sat, 30 Nov 2024 21:04:07 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1262-1-python3.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1262-1-python3.5/">
      
&lt;p&gt;Package : python3.5&lt;/p&gt;


&lt;p&gt;Version : 3.5.3-1&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9287&#34;&gt;CVE-2024-9287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in python3.5, an interactive high-level
object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2023-27043:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module of Python
incorrectly parsed e-mail addresses that contain
a special character. The wrong portion of an
RFC2822 header was identified as the value of the addr-spec.
In some applications, an attacker could bypass a protection
mechanism in which application access is granted only after
verifying receipt of e-mail to a specific domain (e.g.,
only @company.example.com addresses may be used for signup).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6232:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Regular expressions that allowed excessive
backtracking during tarfile.TarFile header parsing were vulnerable
to ReDoS via specifically-crafted tar archives.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6923&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module didn’t properly quote
newlines for email headers when serializing an email message,
allowing for header injection when an email is serialized.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-7592&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When parsing cookies that contained
backslashes for quoted characters in the cookie value,
the parser would use an algorithm with quadratic complexity,
resulting in excess CPU resources being used while parsing
the value
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-9287&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability has been found in the `venv`
module and CLI where path names provided when creating a
virtual environment were not quoted properly, allowing the
creator to inject commands into virtual environment &amp;quot;activation&amp;quot;
scripts (ie &amp;quot;source venv/bin/activate&amp;quot;).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-11168&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The urllib.parse.urlsplit() and urlparse()
functions improperly validated bracketed hosts (`[]`),
allowing hosts that weren&#39;t IPv6 or IPvFuture. This behavior
was not conformant to RFC 3986 and potentially enabled SSRF
if a URL is processed by more than one URL parser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1261-1 dnsmasq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1261-1-dnsmasq/</link>
      <pubDate>Sat, 30 Nov 2024 16:28:29 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1261-1-dnsmasq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1261-1-dnsmasq/">
      
&lt;p&gt;Package : dnsmasq&lt;/p&gt;


&lt;p&gt;Version : 2.80-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50387&#34;&gt;CVE-2023-50387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50868&#34;&gt;CVE-2023-50868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were found in dnsmasq, a small caching DNS proxy and
DHCP/TFTP server, which could lead to denial of service by querying specially
crafted DNS resource records in control of an attacker.&lt;/p&gt;
&lt;p&gt;CVE-2023-50387&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840,
and related RFCs) allow remote attackers to cause a denial of service (CPU
consumption) via one or more DNSSEC responses, aka the &amp;quot;KeyTrap&amp;quot; issue. One
of the concerns is that, when there is a zone with many DNSKEY and RRSIG
records, the protocol specification implies that an algorithm must evaluate
all combinations of DNSKEY and RRSIG records.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-50868&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC
9276 guidance is skipped) allows remote attackers to cause a denial of
service (CPU consumption for SHA-1 computations) via DNSSEC responses in a
random subdomain attack, aka the &amp;quot;NSEC3&amp;quot; issue. The RFC 5155 specification
implies that an algorithm must perform thousands of iterations of a hash
function in certain situations.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1260-1 activemq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1260-1-activemq/</link>
      <pubDate>Sat, 30 Nov 2024 14:49:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1260-1-activemq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1260-1-activemq/">
      
&lt;p&gt;Package : activemq&lt;/p&gt;


&lt;p&gt;Version : 5.14.3-3&amp;#43;deb9u3 (stretch) 5.15.16-0&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46604&#34;&gt;CVE-2023-46604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41678&#34;&gt;CVE-2022-41678&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in the activemq suite of packages. Activemq is the java-based
flexible &amp;amp; powerful open source multi-protocol message broker.&lt;/p&gt;
&lt;p&gt;CVE-2022-41678&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.

The fix for this problem has been added to both the Debian Stretch and the Debian Buster packages.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-46604&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath.

The fix for this problem has been added to the Debian Stretch package. The Debian Buster package was fixed already
in a previous update, in version 5.15.16-0+deb10u1.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1259-1 editorconfig-core security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1259-1-editorconfig-core/</link>
      <pubDate>Sat, 30 Nov 2024 13:07:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1259-1-editorconfig-core/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1259-1-editorconfig-core/">
      
&lt;p&gt;Package : editorconfig-core&lt;/p&gt;


&lt;p&gt;Version : 0.12.1-1.1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0341&#34;&gt;CVE-2023-0341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-53849&#34;&gt;CVE-2024-53849&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in editorconfig-core, a coding style indenter
for all editors. Both issues are related to buffer overflows in different
locations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1258-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1258-1-openssl/</link>
      <pubDate>Sat, 30 Nov 2024 19:15:19 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1258-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1258-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u22 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5678&#34;&gt;CVE-2023-5678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0727&#34;&gt;CVE-2024-0727&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets Layer
toolkit.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-5678&#34;&gt;CVE-2023-5678&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with excessively long X9.42 DH keys.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-0727&#34;&gt;CVE-2024-0727&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with a null field in a PKCS12 file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1257-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1257-1-openssl/</link>
      <pubDate>Sat, 30 Nov 2024 19:14:29 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1257-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1257-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.1.0l-1~deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5678&#34;&gt;CVE-2023-5678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0727&#34;&gt;CVE-2024-0727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2511&#34;&gt;CVE-2024-2511&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9143&#34;&gt;CVE-2024-9143&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets Layer
toolkit.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-5678&#34;&gt;CVE-2023-5678&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with excessively long X9.42 DH keys.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-0727&#34;&gt;CVE-2024-0727&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with a null field in a PKCS12 file.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-2511&#34;&gt;CVE-2024-2511&lt;/h3&gt;
&lt;p&gt;A denial of service could occur when the &lt;code&gt;SSL_OP_NO_TICKET&lt;/code&gt; flag is set, with
TLSv1.3.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-9143&#34;&gt;CVE-2024-9143&lt;/h3&gt;
&lt;p&gt;Use of the low-level &lt;code&gt;GF(2^m)&lt;/code&gt; elliptic curve APIs with untrusted explicit
values for the field polynomial can lead to out-of-bounds memory reads or
writes.  This could lead to information disclosure or possibly remote code
execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1256-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1256-1-openssl/</link>
      <pubDate>Sat, 30 Nov 2024 19:13:05 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1256-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1256-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.1.1n-0&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5678&#34;&gt;CVE-2023-5678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0727&#34;&gt;CVE-2024-0727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2511&#34;&gt;CVE-2024-2511&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4741&#34;&gt;CVE-2024-4741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5535&#34;&gt;CVE-2024-5535&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9143&#34;&gt;CVE-2024-9143&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets Layer
toolkit.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-5678&#34;&gt;CVE-2023-5678&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with excessively long X9.42 DH keys.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-0727&#34;&gt;CVE-2024-0727&lt;/h3&gt;
&lt;p&gt;A denial of service could occur with a null field in a PKCS12 file.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-2511&#34;&gt;CVE-2024-2511&lt;/h3&gt;
&lt;p&gt;A denial of service could occur when the &lt;code&gt;SSL_OP_NO_TICKET&lt;/code&gt; flag is set, with
TLSv1.3.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-4741&#34;&gt;CVE-2024-4741&lt;/h3&gt;
&lt;p&gt;A use-after-free problem was found in the &lt;code&gt;SSL_free_buffers&lt;/code&gt; function.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-5535&#34;&gt;CVE-2024-5535&lt;/h3&gt;
&lt;p&gt;Calling the OpenSSL API function &lt;code&gt;SSL_select_next_proto&lt;/code&gt; with an empty
supported client protocols buffer may cause a crash or memory contents to be
sent to the peer.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-9143&#34;&gt;CVE-2024-9143&lt;/h3&gt;
&lt;p&gt;Use of the low-level &lt;code&gt;GF(2^m)&lt;/code&gt; elliptic curve APIs with untrusted explicit
values for the field polynomial can lead to out-of-bounds memory reads or
writes.  This could lead to information disclosure or possibly remote code
execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1255-1 unbound1.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1255-1-unbound1.9/</link>
      <pubDate>Thu, 28 Nov 2024 23:00:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1255-1-unbound1.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1255-1-unbound1.9/">
      
&lt;p&gt;Package : unbound1.9&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u2~deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8508&#34;&gt;CVE-2024-8508&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43167&#34;&gt;CVE-2024-43167&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43168&#34;&gt;CVE-2024-43168&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in unbound, a validating,
recursive, caching DNS resolver.&lt;/p&gt;
&lt;p&gt;CVE-2024-8508&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When handling replies with very large RRsets that unbound needs to perform
name compression for, it can spend a considerable time applying name
compression to downstream replies, potentially leading to degraded
performance and eventually denial of service in well orchestrated attacks.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43167&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in
Unbound. This issue could allow an attacker who can invoke specific
sequences of API calls to cause a segmentation fault. When certain API
functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a
particular order, the program attempts to read from a NULL pointer,
leading to a crash. This issue can result in a denial of service by causing
the application to terminate unexpectedly.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43168&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-buffer-overflow flaw was found in the cfg_mark_ports function within
Unbound&#39;s config_file.c, which can lead to memory corruption. This issue
could allow an attacker with local access to provide specially crafted
input, potentially causing the application to crash or allowing arbitrary
code execution. This could result in a denial of service or unauthorized
actions on the system.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1254-1 icinga2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1254-1-icinga2/</link>
      <pubDate>Thu, 28 Nov 2024 22:50:44 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1254-1-icinga2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1254-1-icinga2/">
      
&lt;p&gt;Package : icinga2&lt;/p&gt;


&lt;p&gt;Version : 2.10.3-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29663&#34;&gt;CVE-2020-29663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32739&#34;&gt;CVE-2021-32739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32743&#34;&gt;CVE-2021-32743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37698&#34;&gt;CVE-2021-37698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49369&#34;&gt;CVE-2024-49369&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in icinga2, a general-purpose
monitoring application.&lt;/p&gt;
&lt;p&gt;CVE-2020-29663&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered where revoked certificates due for renewal were
automatically being renewed, ignoring the CRL.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-32739&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was discovered that may allow privilege escalation for
authenticated API users. With a read-only user&#39;s credentials, an attacker can
view most attributes of all config objects including `ticket_salt` of
`ApiListener`. This salt is enough to compute a ticket for every possible
common name (CN). A ticket, the master node&#39;s certificate, and a self-signed
certificate are enough to successfully request the desired certificate from
Icinga. That certificate may in turn be used to steal an endpoint or API user&#39;s
identity. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-32743&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Some of the Icinga 2 features that require credentials for external
services expose those credentials through the API to authenticated API users
with read permissions for the corresponding object types.  IdoMysqlConnection
and IdoPgsqlConnection (every released version) exposes the password of the
user used to connect to the database.  ElasticsearchWriter (added in 2.8.0)
exposes the password used to connect to the Elasticsearch server. An attacker
who obtains these credentials can impersonate Icinga to these services and add,
modify and delete information there.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37698&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do
not verify the server&#39;s certificate despite a certificate authority being
specified. Instances which connect to any of the mentioned time series
databases (TSDBs) using TLS over a spoofable infrastructure should change the
credentials (if any) used by the TSDB writer feature to authenticate against
the TSDB.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-49369&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The TLS certificate validation in all Icinga 2 versions starting from
2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster
nodes as well as any API users that use TLS client certificates for
authentication (ApiUser objects with the `client_cn` attribute set).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1253-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1253-1-redis/</link>
      <pubDate>Thu, 28 Nov 2024 23:45:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1253-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1253-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u13 (jessie), 3:3.2.6-3&amp;#43;deb9u13 (stretch), 5:5.0.14-1&amp;#43;deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-35977&#34;&gt;CVE-2022-35977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36021&#34;&gt;CVE-2022-36021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25155&#34;&gt;CVE-2023-25155&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31228&#34;&gt;CVE-2024-31228&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31449&#34;&gt;CVE-2024-31449&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the key–value database Redis.&lt;/p&gt;
&lt;p&gt;CVE-2022-35977&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;integer overflows in SETRANGE and SORT
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36021 (jessie, stretch)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;string pattern matching DoS
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25155&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SRANDMEMBER integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31228&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;unbounded pattern matching DoS
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31449 (stretch)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lua bit library stack overflow
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1252-1 libmodule-scandeps-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1252-1-libmodule-scandeps-perl/</link>
      <pubDate>Thu, 28 Nov 2024 17:29:38 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1252-1-libmodule-scandeps-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1252-1-libmodule-scandeps-perl/">
      
&lt;p&gt;Package : libmodule-scandeps-perl&lt;/p&gt;


&lt;p&gt;Version : 1.16-1&amp;#43;deb8u1 (jessie), 1.23-1&amp;#43;deb9u1 (stretch), 1.27-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10224&#34;&gt;CVE-2024-10224&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Threat Research Unit discovered that libmodule-scandeps-perl,
a Perl module to recursively scan Perl code for dependencies, allows an
attacker to execute arbitrary shell commands via specially crafted file
names.&lt;/p&gt;
&lt;p&gt;Details can be found in the Qualys advisory at
&lt;a href=&#34;https://www.qualys.com/2024/11/19/needrestart/needrestart.txt&#34;&gt;https://www.qualys.com/2024/11/19/needrestart/needrestart.txt&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1251-1 mpg123 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1251-1-mpg123/</link>
      <pubDate>Thu, 28 Nov 2024 19:56:36 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1251-1-mpg123/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1251-1-mpg123/">
      
&lt;p&gt;Package : mpg123&lt;/p&gt;


&lt;p&gt;Version : 1.23.8-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9545&#34;&gt;CVE-2017-9545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-10683&#34;&gt;CVE-2017-10683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12797&#34;&gt;CVE-2017-12797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12839&#34;&gt;CVE-2017-12839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10573&#34;&gt;CVE-2024-10573&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;mpg123 a popular MPEG layer 1/2/3 audio player was affected
by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2017-9545&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The next_text function allowed remote attackers to cause a
Denial Of Service (buffer over-read) via a crafted mp3 file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-10683&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-based buffer over-read was found in the convert_latin1 function.
A crafted input will lead to a remote denial of service attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-12797&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Integer Overflow was found in the INT123_parse_new_id3 function
in the ID3 parser in mpg123 on 32-bit platforms. This vulnerability
allowed remote attackers to cause a denial of service via a crafted
file, which triggers a heap-based buffer overflow.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-12839&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-based buffer over-read was found in the getbits function.
This vulnerability allowed a remote attackers to cause
a possible denial-of-service (out-of-bounds read) via a
crafted mp3 file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-10573&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds write flaw was found in mpg123 when handling crafted
streams. When decoding PCM, the libmpg123 may write past the end
of a heap-located buffer. Consequently, heap corruption may happen.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1250-1 mpg123 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1250-1-mpg123/</link>
      <pubDate>Thu, 28 Nov 2024 19:52:11 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1250-1-mpg123/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1250-1-mpg123/">
      
&lt;p&gt;Package : mpg123&lt;/p&gt;


&lt;p&gt;Version : 1.25.10-2&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-10573&#34;&gt;CVE-2024-10573&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;mpg123 a popular MPEG layer 1/2/3 audio player was affected
by a vulnerability.&lt;/p&gt;
&lt;p&gt;An out-of-bounds write flaw was found in mpg123 when handling crafted
streams. When decoding PCM, the libmpg123 may write past the end
of a heap-located buffer. Consequently, heap corruption may happen.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1249-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1249-1-tzdata/</link>
      <pubDate>Thu, 28 Nov 2024 20:44:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1249-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1249-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2024b-0&amp;#43;deb8u1 (jessie), 2024b-0&amp;#43;deb9u1 (stretch), 2024b-0&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2024b. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Updated leap second list, which was set to expire by the end of
December.&lt;/li&gt;
&lt;li&gt;Correction of historical data for Mexico, Mongolia and Portugal.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1248-1 twisted security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1248-1-twisted/</link>
      <pubDate>Thu, 28 Nov 2024 16:18:16 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1248-1-twisted/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1248-1-twisted/">
      
&lt;p&gt;Package : twisted&lt;/p&gt;


&lt;p&gt;Version : 16.6.0-2&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41671&#34;&gt;CVE-2024-41671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41810&#34;&gt;CVE-2024-41810&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in Twisted, an event-based framework
for internet applications, which could result in incorrect ordering of
HTTP requests or cross-site scripting.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-41671&lt;/p&gt;
&lt;p&gt;The HTTP 1.0 and 1.1 server provided by twisted.web could process
pipelined HTTP requests out-of-order, possibly resulting in
information disclosure.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-41810&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;twisted.web.util.redirectTo&lt;/code&gt; function contains an HTML
injection vulnerability. If application code allows an attacker to
control the redirect URL this vulnerability may result in
Reflected Cross-Site Scripting (XSS) in the redirect response HTML
body.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1247-1 twisted security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1247-1-twisted/</link>
      <pubDate>Thu, 28 Nov 2024 16:17:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1247-1-twisted/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1247-1-twisted/">
      
&lt;p&gt;Package : twisted&lt;/p&gt;


&lt;p&gt;Version : 18.9.0-3&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46137&#34;&gt;CVE-2023-46137&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41671&#34;&gt;CVE-2024-41671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41810&#34;&gt;CVE-2024-41810&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in Twisted, an event-based framework
for internet applications, which could result in incorrect ordering of
HTTP requests or cross-site scripting.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-46137&lt;/p&gt;
&lt;p&gt;When sending multiple HTTP requests in one TCP packet, twisted.web
will process the requests asynchronously without guaranteeing the
response order. If one of the endpoints is controlled by an
attacker, the attacker can delay the response on purpose to
manipulate the response of the second request when a victim
launched two requests using HTTP pipeline.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-41671&lt;/p&gt;
&lt;p&gt;The HTTP 1.0 and 1.1 server provided by twisted.web could process
pipelined HTTP requests out-of-order, possibly resulting in
information disclosure.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-41810&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;twisted.web.util.redirectTo&lt;/code&gt; function contains an HTML
injection vulnerability. If application code allows an attacker to
control the redirect URL this vulnerability may result in
Reflected Cross-Site Scripting (XSS) in the redirect response HTML
body.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1246-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1246-1-exim4/</link>
      <pubDate>Wed, 27 Nov 2024 16:22:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1246-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1246-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.84.2-2&amp;#43;deb8u13 (jessie), 4.89-2&amp;#43;deb9u14 (stretch), 4.92-8&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42117&#34;&gt;CVE-2023-42117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42119&#34;&gt;CVE-2023-42119&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple potential security vulnerabilities have been addressed in exim4, a
mail transport agent. These issues may allow remote attackers to disclose
sensitive information or execute arbitrary code but only if Exim4 is run behind
or with untrusted proxy servers or DNS resolvers. If your proxy-protocol proxy
or DNS resolver are trustworthy, you are not affected.&lt;/p&gt;
&lt;p&gt;In addition
&lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38371&#34;&gt;CVE-2021-38371&lt;/a&gt; and
&lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3559&#34;&gt;CVE-2022-3559&lt;/a&gt; have been addressed for Debian 10
&amp;ldquo;Buster&amp;rdquo; and
&lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3559&#34;&gt;CVE-2022-3559&lt;/a&gt; for Debian 9 &amp;ldquo;Stretch&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1245-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1245-1-bind9/</link>
      <pubDate>Wed, 27 Nov 2024 11:56:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1245-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1245-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.10.3.dfsg.P4-12.3&amp;#43;deb9u17 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1737&#34;&gt;CVE-2024-1737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1975&#34;&gt;CVE-2024-1975&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in BIND, a DNS server
implementation, which may result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1244-1 python3.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1244-1-python3.7/</link>
      <pubDate>Tue, 26 Nov 2024 11:13:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1244-1-python3.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1244-1-python3.7/">
      
&lt;p&gt;Package : python3.7&lt;/p&gt;


&lt;p&gt;Version : 3.7.3-2&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27043&#34;&gt;CVE-2023-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6232&#34;&gt;CVE-2024-6232&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6923&#34;&gt;CVE-2024-6923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7592&#34;&gt;CVE-2024-7592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9287&#34;&gt;CVE-2024-9287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11168&#34;&gt;CVE-2024-11168&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in python3.7, an interactive high-level
object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2023-27043:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module of Python
incorrectly parsed e-mail addresses that contain
a special character. The wrong portion of an
RFC2822 header was identified as the value of the addr-spec.
In some applications, an attacker could bypass a protection
mechanism in which application access is granted only after
verifying receipt of e-mail to a specific domain (e.g.,
only @company.example.com addresses may be used for signup).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6232:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Regular expressions that allowed excessive
backtracking during tarfile.TarFile header parsing were vulnerable
to ReDoS via specifically-crafted tar archives.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6923&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module didn’t properly quote
newlines for email headers when serializing an email message,
allowing for header injection when an email is serialized.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-7592&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When parsing cookies that contained
backslashes for quoted characters in the cookie value,
the parser would use an algorithm with quadratic complexity,
resulting in excess CPU resources being used while parsing
the value
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-9287&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability has been found in the `venv`
module and CLI where path names provided when creating a
virtual environment were not quoted properly, allowing the
creator to inject commands into virtual environment &amp;quot;activation&amp;quot;
scripts (ie &amp;quot;source venv/bin/activate&amp;quot;).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-11168&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The urllib.parse.urlsplit() and urlparse()
functions improperly validated bracketed hosts (`[]`),
allowing hosts that weren&#39;t IPv6 or IPvFuture. This behavior
was not conformant to RFC 3986 and potentially enabled SSRF
if a URL is processed by more than one URL parser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1243-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1243-1-ghostscript/</link>
      <pubDate>Sun, 24 Nov 2024 23:59:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1243-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1243-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u13 (jessie), 9.26a~dfsg-0&amp;#43;deb9u13 (stretch), 9.27~dfsg-2&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46951&#34;&gt;CVE-2024-46951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46953&#34;&gt;CVE-2024-46953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46955&#34;&gt;CVE-2024-46955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46956&#34;&gt;CVE-2024-46956&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the PostScript/PDF
interpreter Ghostscript.&lt;/p&gt;
&lt;p&gt;CVE-2024-46951&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PS interpreter unchecked pointer
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-46953&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;output filename format string integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-46955&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PS interpreter out-of-bounds
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-46956&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PS interpreter out-of-bounds
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1242-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1242-1-intel-microcode/</link>
      <pubDate>Sun, 24 Nov 2024 15:45:15 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1242-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1242-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20240910.1~deb8u1 (jessie), 3.20240910.1~deb9u1 (stretch), 3.20240910.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23984&#34;&gt;CVE-2024-23984&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24968&#34;&gt;CVE-2024-24968&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A microcode update has been released for Intel processors, addressing
multiple vulnerabilties which potentially could cause information
disclosue or local DoS.&lt;/p&gt;
&lt;p&gt;CVE-2024-23984&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Observable discrepancy in RAPL interface for some Intel(R)
Processors may allow a privileged user to potentially enable
information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-24968&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper finite state machines (FSMs) in hardware logic in some
Intel(R) Processors may allow an privileged user to potentially
enable a denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1241-1 amd64-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1241-1-amd64-microcode/</link>
      <pubDate>Sun, 24 Nov 2024 10:28:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1241-1-amd64-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1241-1-amd64-microcode/">
      
&lt;p&gt;Package : amd64-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20240820.1~deb8u1 (jessie), 3.20240820.1~deb9u1 (stretch), 3.20240820.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20569&#34;&gt;CVE-2023-20569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20584&#34;&gt;CVE-2023-20584&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31315&#34;&gt;CVE-2023-31315&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31356&#34;&gt;CVE-2023-31356&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;AMD has released microcode updates to address multiple vulnerabilties.&lt;/p&gt;
&lt;p&gt;This release requires &lt;em&gt;either&lt;/em&gt; new-enough system firmware, &lt;em&gt;or&lt;/em&gt; a
recent-enough Linux kernel to properly work on AMD Genoa and Bergamo
processors.&lt;/p&gt;
&lt;p&gt;The firmware requirement is AGESA 1.0.0.8 or newer.&lt;/p&gt;
&lt;p&gt;The Linux kernel requirement is a group of patches that are already
present in the Linux stable/LTS/ELTS trees since versions: v4.19.289,
v5.4.250, v5.10.187, v5.15.120, v6.1.37, v6.3.11 and v6.4.1.  These
patches are also present in Linux v6.5-rc1.&lt;/p&gt;
&lt;p&gt;CVE-2023-20569&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A side channel vulnerability on some of the AMD CPUs may allow an
attacker to influence the return address prediction. This may result
in speculative execution at an attacker-controlled?address,
potentially leading to information disclosure. 

CVE-2023-20569 had been previously reported as fixed in an earlier
update, this update expands the fixes to 4th Gen AMD EPYC
processors, Genoa (Family=0x19 Model=0x11) and Bergamo (Family=0x19
Model=0xa0). See Debian bug #1043381 for details.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-20584&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;IOMMU improperly handles certain special address ranges with invalid
device table entries (DTEs), which may allow an attacker with
privileges and a compromised Hypervisor to induce DTE faults to
bypass RMP checks in SEV-SNP, potentially leading to a loss of guest
integrity.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31315&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper validation in a model specific register (MSR) could allow a
malicious program with ring0 access to modify SMM configuration
while SMI lock is enabled, potentially leading to arbitrary code
execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31356&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incomplete system memory cleanup in SEV firmware could allow a
privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1240-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1240-1-glib2.0/</link>
      <pubDate>Sat, 23 Nov 2024 21:00:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1240-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1240-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.42.1-1&amp;#43;deb8u8 (jessie), 2.50.3-2&amp;#43;deb9u7 (stretch), 2.58.3-2&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-52533&#34;&gt;CVE-2024-52533&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow with long SOCKS4a proxy hostname and username has been fixed in the GNOME Input/Output library (GIO).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1239-1 qtbase-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1239-1-qtbase-opensource-src/</link>
      <pubDate>Fri, 22 Nov 2024 23:43:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1239-1-qtbase-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1239-1-qtbase-opensource-src/">
      
&lt;p&gt;Package : qtbase-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.3.2&amp;#43;dfsg-4&amp;#43;deb8u7 (jessie), 5.7.1&amp;#43;dfsg-3&amp;#43;deb9u5 (stretch), 5.11.3&amp;#43;dfsg1-1&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24607&#34;&gt;CVE-2023-24607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32763&#34;&gt;CVE-2023-32763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-33285&#34;&gt;CVE-2023-33285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34410&#34;&gt;CVE-2023-34410&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37369&#34;&gt;CVE-2023-37369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38197&#34;&gt;CVE-2023-38197&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in qtbase-opensource-src, the core part of the Qt 5 application framework.&lt;/p&gt;
&lt;p&gt;CVE-2023-24607 (jessie)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Qt SQL ODBC driver DoS
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32763 (jessie)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Qt SVG buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-33285 (jessie)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;QDnsLookup buffer over-read
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34410&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;certificate validation for TLS did not always consider whether the root of a chain is a configured CA certificate
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-37369 (jessie)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;QXmlStreamReader buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38197 (jessie)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;QXmlStreamReader buffer overflow
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1238-1 needrestart security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1238-1-needrestart/</link>
      <pubDate>Wed, 20 Nov 2024 15:23:01 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1238-1-needrestart/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1238-1-needrestart/">
      
&lt;p&gt;Package : needrestart&lt;/p&gt;


&lt;p&gt;Version : 1.2-8&amp;#43;deb8u3 (jessie), 2.11-3&amp;#43;deb9u3 (stretch), 3.4-5&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-11003&#34;&gt;CVE-2024-11003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48990&#34;&gt;CVE-2024-48990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48991&#34;&gt;CVE-2024-48991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-48992&#34;&gt;CVE-2024-48992&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Threat Research Unit discovered several local privilege
escalation vulnerabilities in needrestart, a utility to check which
daemons need to be restarted after library upgrades.&lt;/p&gt;
&lt;p&gt;CVE-2024-11003&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  Local attackers can trick needrestart to call the Perl module
  Module::ScanDeps with attacker-controlled files.
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;CVE-2024-48990&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  Local attackers can execute arbitrary code as root by tricking needrestart
  into running the Python interpreter with an attacker-controlled PYTHONPATH
  environment variable.
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;CVE-2024-28991&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  Local attackers can execute arbitrary code as root by winning a race
  condition and tricking needrestart into running their own, fake Python
  interpreter (instead of the system&amp;#39;s real Python interpreter).
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;CVE-2024-28992&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  Local attackers can also execute arbitrary code as root by tricking
  needrestart into running the Ruby interpreter with an attacker-controlled
  RUBYLIB environment variable.
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Details can be found in the Qualys advisory at
&lt;a href=&#34;https://www.qualys.com/2024/11/19/needrestart/needrestart.txt&#34;&gt;https://www.qualys.com/2024/11/19/needrestart/needrestart.txt&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1237-1 smarty3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1237-1-smarty3/</link>
      <pubDate>Sun, 17 Nov 2024 12:54:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1237-1-smarty3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1237-1-smarty3/">
      
&lt;p&gt;Package : smarty3&lt;/p&gt;


&lt;p&gt;Version : 3.1.33&amp;#43;20180830.1.3a78a21f&amp;#43;selfpack1-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25047&#34;&gt;CVE-2018-25047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28447&#34;&gt;CVE-2023-28447&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35226&#34;&gt;CVE-2024-35226&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties were discovered for smarty3, a widely-used PHP
templating engine, which potentially allows an attacker to perform an
XSS (e.g JavaScript or PHP code injection).&lt;/p&gt;
&lt;p&gt;CVE-2018-25047&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Smarty before 3.1.47 and 4.x before 4.2.1,
libs/plugins/function.mailto.php allows XSS. A web page that uses
smarty_function_mailto, and that could be parameterized using GET or
POST input parameters, could allow injection of JavaScript code by a
user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-25047 had already been reported as fixed previously via
DLA-3262-1, however it was found the fix was incomplete.&lt;/p&gt;
&lt;p&gt;CVE-2023-28447&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In affected versions smarty did not properly escape javascript code.
An attacker could exploit this vulnerability to execute arbitrary
JavaScript code in the context of the user&#39;s browser session. This
may lead to unauthorized access to sensitive user data, manipulation
of the web application&#39;s behavior, or unauthorized actions performed
on behalf of the user. Users are advised to upgrade to either
version 3.1.48 or to 4.3.1 to resolve this issue. There are no known
workarounds for this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-35226&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In affected versions template authors could inject php code by
choosing a malicious file name for an extends-tag. Sites that cannot
fully trust template authors should update asap. All users are
advised to update.  There is no patch for users on the v3 branch.
There are no known workarounds for this vulnerability.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1236-1 waitress security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1236-1-waitress/</link>
      <pubDate>Sat, 16 Nov 2024 23:56:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1236-1-waitress/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1236-1-waitress/">
      
&lt;p&gt;Package : waitress&lt;/p&gt;


&lt;p&gt;Version : 1.2.0~b2-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-49769&#34;&gt;CVE-2024-49769&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;DoS due to resource exhaustion has been fixed in waitress, a Python Web Server Gateway Interface server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1235-1 unbound security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1235-1-unbound/</link>
      <pubDate>Fri, 15 Nov 2024 14:02:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1235-1-unbound/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1235-1-unbound/">
      
&lt;p&gt;Package : unbound&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8508&#34;&gt;CVE-2024-8508&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43167&#34;&gt;CVE-2024-43167&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43168&#34;&gt;CVE-2024-43168&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in unbound, a validating,
recursive, caching DNS resolver.&lt;/p&gt;
&lt;p&gt;CVE-2024-8508&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When handling replies with very large RRsets that unbound needs to perform
name compression for, it can spend a considerable time applying name
compression to downstream replies, potentially leading to degraded
performance and eventually denial of service in well orchestrated attacks.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43167&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in
Unbound. This issue could allow an attacker who can invoke specific
sequences of API calls to cause a segmentation fault. When certain API
functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a
particular order, the program attempts to read from a NULL pointer,
leading to a crash. This issue can result in a denial of service by causing
the application to terminate unexpectedly.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-43168&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-buffer-overflow flaw was found in the cfg_mark_ports function within
Unbound&#39;s config_file.c, which can lead to memory corruption. This issue
could allow an attacker with local access to provide specially crafted
input, potentially causing the application to crash or allowing arbitrary
code execution. This could result in a denial of service or unauthorized
actions on the system.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1234-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1234-1-apache2/</link>
      <pubDate>Fri, 15 Nov 2024 08:36:15 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1234-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1234-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.59-1~deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38473&#34;&gt;CVE-2024-38473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in apache2, a popular web server.&lt;/p&gt;
&lt;p&gt;An encoding problem in mod_proxy allowed request URLs with incorrect encoding to be sent
to backend services, potentially bypassing authentication via crafted requests.&lt;/p&gt;
&lt;p&gt;This affects configurations where mechanisms other than ProxyPass/ProxyPassMatch
or RewriteRule with the &amp;lsquo;P&amp;rsquo; flag are used to configure a request to be proxied,
such as SetHandler or inadvertent proxying via CVE-2024-39573.&lt;/p&gt;
&lt;p&gt;Note that these alternate mechanisms may be used within .htaccess.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1233-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1233-1-libarchive/</link>
      <pubDate>Mon, 11 Nov 2024 23:51:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1233-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1233-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.1.2-11&amp;#43;deb8u12 (jessie), 3.2.2-2&amp;#43;deb9u5 (stretch), 3.3.3-4&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20696&#34;&gt;CVE-2024-20696&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;RAR reader out-of-bounds write has been fixed in libarchive, a multi-format archive and compression library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1232-1 libseccomp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1232-1-libseccomp/</link>
      <pubDate>Mon, 11 Nov 2024 13:02:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1232-1-libseccomp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1232-1-libseccomp/">
      
&lt;p&gt;Package : libseccomp&lt;/p&gt;


&lt;p&gt;Version : 2.4.1-1~deb8u1 (jessie), 2.4.1-1~deb9u1 (stretch), 2.4.1-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9893&#34;&gt;CVE-2019-9893&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The kernel syscall filtering library libseccomp has been upgraded to version 2.4.1 to fix 64-bit argument comparisons.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1231-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1231-1-nss/</link>
      <pubDate>Sat, 09 Nov 2024 22:46:29 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1231-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1231-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u19 (jessie) 2:3.26.2-1.1&amp;#43;deb9u8 (stretch) 2:3.42.1-1&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6602&#34;&gt;CVE-2024-6602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6609&#34;&gt;CVE-2024-6609&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in the nss suite of packages, which include libnss3
and other tools for dealing with certificates and security standards.&lt;/p&gt;
&lt;p&gt;CVE-2024-6602&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A mismatch between allocator and deallocator could have lead to memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-6609&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When almost out-of-memory an elliptic curve key which was never allocated could have been freed again.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1230-1 context bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1230-1-context/</link>
      <pubDate>Tue, 05 Nov 2024 21:43:40 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1230-1-context/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1230-1-context/">
      
&lt;p&gt;Package : context&lt;/p&gt;


&lt;p&gt;Version : 2018.04.04.20181118-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;The CVE-2023-32700 fix for the texlive-bin package, released for Debian 10
&amp;ldquo;buster&amp;rdquo; as DLA-3427-1, introduced a regression in context, a general-purpose
document processor. The DLA-3427-1 update broke the context binary package
installation process.&lt;/p&gt;
&lt;p&gt;This regression update corrects the issue, fixing the context package&amp;rsquo;s mtxrun script&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1229-1 libheif security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1229-1-libheif/</link>
      <pubDate>Tue, 05 Nov 2024 13:21:10 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1229-1-libheif/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1229-1-libheif/">
      
&lt;p&gt;Package : libheif&lt;/p&gt;


&lt;p&gt;Version : 1.3.2-2&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0996&#34;&gt;CVE-2023-0996&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There was a vulnerability in the strided image parsing code in
&lt;a href=&#34;https://github.com/strukturag/libheif&#34;&gt;&lt;code&gt;libheif&lt;/code&gt;&lt;/a&gt;, a decoder/encoder for the
HEIF and AVIF image formats.&lt;/p&gt;
&lt;p&gt;An attacker could have exploited this through a crafted image file to cause a
buffer overflow in linear memory during a &lt;code&gt;memcpy&lt;/code&gt; call.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1228-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1228-1-openjdk-8/</link>
      <pubDate>Mon, 04 Nov 2024 18:20:50 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1228-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1228-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u432-b06-2~deb8u1 (jessie), 8u432-b06-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21208&#34;&gt;CVE-2024-21208&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21210&#34;&gt;CVE-2024-21210&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21217&#34;&gt;CVE-2024-21217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21235&#34;&gt;CVE-2024-21235&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, information disclosure or bypass
of Java sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1227-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1227-1-libxml2/</link>
      <pubDate>Sun, 03 Nov 2024 09:13:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1227-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1227-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u17 (jessie), 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9318&#34;&gt;CVE-2016-9318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16932&#34;&gt;CVE-2017-16932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39615&#34;&gt;CVE-2023-39615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45322&#34;&gt;CVE-2023-45322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25062&#34;&gt;CVE-2024-25062&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in libxml2, a library providing
support to read, modify and write XML and HTML files, potentially allowing
an attacker to perform denial of service or trigger an use-after-free situation.&lt;/p&gt;
&lt;p&gt;CVE-2016-9318 (Debian 8 update only)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XML External Entity (XXE) attacks via a crafted document.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note: CVE-2016-9318 has been previously addressed for Debian 10  (buster) in ELA-1195.&lt;/p&gt;
&lt;p&gt;CVE-2017-16932&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When expanding a parameter entity in a DTD, infinite recursion could lead to
an infinite loop or memory exhaustion.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39615&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via
the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability
allows attackers to cause a Denial of Service (DoS) via supplying a crafted
XML file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45322&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 through 2.11.5 has a use-after-free that can only occur after a
certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-25062&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5.
When using the XML Reader interface with DTD validation and XInclude 
expansion enabled, processing crafted XML documents can lead to an 
xmlValidatePopElement use-after-free.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1226-1 perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1226-1-perl/</link>
      <pubDate>Sat, 02 Nov 2024 18:08:01 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1226-1-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1226-1-perl/">
      
&lt;p&gt;Package : perl&lt;/p&gt;


&lt;p&gt;Version : 5.20.2-3&amp;#43;deb8u14 (jessie), 5.24.1-3&amp;#43;deb9u8 (stretch), 5.28.1-6&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16156&#34;&gt;CVE-2020-16156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31484&#34;&gt;CVE-2023-31484&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Perl a popular script language was affected by multiple vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2020-16156:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; An attacker can prepend checksums for modified
 packages to the beginning of CHECKSUMS files,
 before the cleartext PGP headers. This makes
 the Module::Signature::_verify() checks
 in both cpan and cpanm pass.
 Without the sigtext and plaintext arguments
 to _verify(), the _compare() check is bypassed.
 This results in _verify() only checking that
 valid signed cleartext is present somewhere
 in the file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31484:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CPAN.pm does not verify TLS certificates
when downloading distributions over HTTPS.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1225-1 texlive-bin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1225-1-texlive-bin/</link>
      <pubDate>Fri, 01 Nov 2024 22:31:54 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1225-1-texlive-bin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1225-1-texlive-bin/">
      
&lt;p&gt;Package : texlive-bin&lt;/p&gt;


&lt;p&gt;Version : 2016.20160513.41080.dfsg-2&amp;#43;deb9u2 (stretch), 2018.20181218.49446-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32668&#34;&gt;CVE-2023-32668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25262&#34;&gt;CVE-2024-25262&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;TeXLive, a popular software distribution for the TeX typesetting system
that includes major TeX-related programs, macro packages, and fonts,
was affected by two vulnerabilties.&lt;/p&gt;
&lt;p&gt;CVE-2023-32668&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A document (compiled with the default settings)
was allowed to make arbitrary network requests.
This occurs because full access to the socket library was
permitted by default, as stated in the documentation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-25262&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow was found via
the function ttfLoadHDMX:ttfdump. This vulnerability
allows attackers to cause a Denial of Service (DoS)
via supplying a crafted TTF file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1224-1 libcpan-reporter-smoker-perl bug fix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1224-1-libcpan-reporter-smoker-perl/</link>
      <pubDate>Fri, 01 Nov 2024 22:22:16 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1224-1-libcpan-reporter-smoker-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1224-1-libcpan-reporter-smoker-perl/">
      
&lt;p&gt;Package : libcpan-reporter-smoker-perl&lt;/p&gt;


&lt;p&gt;Version : 0.28-1&amp;#43;deb9u1 (stretch), 0.29-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;This update fixes the build of this package, which was preventing security
updates of perl to be tested.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1223-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1223-1-xorg-server/</link>
      <pubDate>Thu, 31 Oct 2024 19:53:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1223-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1223-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u17 (jessie), 2:1.19.2-1&amp;#43;deb9u20 (stretch), 2:1.20.4-1&amp;#43;deb10u15 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-9632&#34;&gt;CVE-2024-9632&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn working with Trend Micro Zero Day Initiative found an
issue in the X server and Xwayland implementations published by X.Org.
CVE-2024-9632 can be triggered by providing a modified bitmap to the X.Org
server. This may lead to local privilege escalation if the server is run
as root or remote code execution (e.g. x11 over ssh).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1222-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1222-1-ffmpeg/</link>
      <pubDate>Thu, 31 Oct 2024 19:52:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1222-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1222-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u5 (stretch), 7:4.1.11-0&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-20898&#34;&gt;CVE-2020-20898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22040&#34;&gt;CVE-2020-22040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22051&#34;&gt;CVE-2020-22051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22056&#34;&gt;CVE-2020-22056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38090&#34;&gt;CVE-2021-38090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38091&#34;&gt;CVE-2021-38091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38092&#34;&gt;CVE-2021-38092&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38093&#34;&gt;CVE-2021-38093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38094&#34;&gt;CVE-2021-38094&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48434&#34;&gt;CVE-2022-48434&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49502&#34;&gt;CVE-2023-49502&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50010&#34;&gt;CVE-2023-50010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51793&#34;&gt;CVE-2023-51793&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51794&#34;&gt;CVE-2023-51794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51798&#34;&gt;CVE-2023-51798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31578&#34;&gt;CVE-2024-31578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32230&#34;&gt;CVE-2024-32230&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the FFmpeg multimedia framework.&lt;/p&gt;
&lt;p&gt;CVE-2020-20898 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_convolution integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-22040&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/f_reverse memory leaks
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-22051 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_tile memory leak
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-22056 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/af_acrossover memory leak
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38090 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_convolution integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38091 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_convolution integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38092 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_convolution integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38093 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_convolution integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38094 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_convolution integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48434 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;lavc/pthread_frame hwaccel use-after-free
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-49502&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/bwdif buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-50010 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_gradfun buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51793 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_weave buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51794 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/af_stereowiden buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51798 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avfilter/vf_minterpolate floating point exception
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31578 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avutil/hwcontext use-after-free
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-32230&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;avcodec/mpegvideo_enc buffer overflow
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1221-1 mariadb-10.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1221-1-mariadb-10.1/</link>
      <pubDate>Wed, 30 Oct 2024 17:38:19 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1221-1-mariadb-10.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1221-1-mariadb-10.1/">
      
&lt;p&gt;Package : mariadb-10.1&lt;/p&gt;


&lt;p&gt;Version : 10.1.48-0&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31621&#34;&gt;CVE-2022-31621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31623&#34;&gt;CVE-2022-31623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31624&#34;&gt;CVE-2022-31624&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47015&#34;&gt;CVE-2022-47015&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21096&#34;&gt;CVE-2024-21096&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been fixed in MariaDB, a popular database server.&lt;/p&gt;
&lt;p&gt;CVE-2022-31621&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In extra/mariabackup/ds_xbstream.cc, when an error occurs
(stream_ctxt-&amp;gt;dest_file == NULL) while executing the method xbstream_open,
the held lock is not released correctly, which allows local users
to trigger a Denial of Service (DoS) due to the deadlock.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31623&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In extra/mariabackup/ds_compress.cc, when an error occurs
(i.e., going to the err label) while executing the method
create_worker_threads, the held lock thd-&amp;gt;ctrl_mutex is not released
correctly, which allows local users to trigger a Denial of Service (DoS)
due to the deadlock.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31624&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;While executing the plugin/server_audit/server_audit.c method log_statement_ex,
the held lock lock_bigbuffer is not released correctly, which allows local
users to trigger a Denial of Service (DoS) due to the deadlock.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47015&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It is possible for function spider_db_mbase::print_warnings to dereference
a null pointer, thus triggering a Denial of Service (DoS).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-21096&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A difficult to exploit vulnerability allows unauthenticated
attacker with logon to the infrastructure where MariaDB Server
executes to compromise MariaDB Server.
Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of
MariaDB Server accessible data as well as unauthorized
read access to a subset of MariaDB Server accessible
data and unauthorized ability to cause a partial
denial of service (partial DoS)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that fixes related to CVE-2024-21096 may break forwards and backwards
compatibility in certain situations when doing logical backup and restore
with plain SQL files (e.g. when using &lt;code&gt;mariadb-dump&lt;/code&gt; or &lt;code&gt;mysqldump&lt;/code&gt;).&lt;/p&gt;
&lt;p&gt;The MariaDB client now has the command-line option &lt;code&gt;--sandbox&lt;/code&gt; and the
MariaDB client database prompt command &lt;code&gt;\-&lt;/code&gt;. This enables sandbox mode for
the rest of the session, until disconnected. Once in sandbox mode, any
command that could do something on the shell is disabled.&lt;/p&gt;
&lt;p&gt;Additionally &lt;code&gt;mysqldump&lt;/code&gt; now adds the following command inside a comment
at the very top of the logical SQL file to trigger sandbox mode:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;/*M!999999\- enable the sandbox mode */
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Newer version of MariaDB clients strip away the backslash and dash (-), and
then tries to execute the internal command with a dash.&lt;/p&gt;
&lt;p&gt;Older versions of MariaDB client and all versions of MySQL client considers
this a comment, and will ignore it. There may however be situations where
importing logical SQL dump files may fail due to this, so users should be
advised.&lt;/p&gt;
&lt;p&gt;Users are best protected from both security issues and interoperability
issues by using the latest &lt;code&gt;mariadb-dump&lt;/code&gt; shipped in MariaDB 11.4.3, 10.11.9,
10.6.19 and 10.5.26. The CVE-2024-21096 was officially fixed already in
11.4.2, but the latest batch of MariaDB minor maintenance releases include
further improvements on the sandbox mode. For buster ELTS this CVE
was fixed in verson 1:10.3.39-0+deb10u3.&lt;/p&gt;
&lt;p&gt;Note that the &lt;code&gt;mariadb-dump&lt;/code&gt; can be used to make the logical backups from
both MariaDB and MySQL servers. Also the &lt;code&gt;mariadb&lt;/code&gt; client program can connect
to both MariaDB and MySQL servers and import those SQL dump files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1220-1 shadow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1220-1-shadow/</link>
      <pubDate>Mon, 28 Oct 2024 23:29:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1220-1-shadow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1220-1-shadow/">
      
&lt;p&gt;Package : shadow&lt;/p&gt;


&lt;p&gt;Version : 1:4.4-4.1&amp;#43;deb9u2 (stretch), 1:4.5-1.1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7169&#34;&gt;CVE-2018-7169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4641&#34;&gt;CVE-2023-4641&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29383&#34;&gt;CVE-2023-29383&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in shadow, commonly used utilities to change and administer password and group data.&lt;/p&gt;
&lt;p&gt;CVE-2018-7169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;unprivileged user can drop supplementary groups
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4641&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;gpasswd password leak
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29383&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;chfn missing control character check
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1219-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1219-1-linux-5.10/</link>
      <pubDate>Mon, 28 Oct 2024 12:04:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1219-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1219-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.226-1~deb8u1 (jessie), 5.10.226-1~deb9u1 (stretch), 5.10.226-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3669&#34;&gt;CVE-2021-3669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48733&#34;&gt;CVE-2022-48733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31083&#34;&gt;CVE-2023-31083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52889&#34;&gt;CVE-2023-52889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27397&#34;&gt;CVE-2024-27397&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38577&#34;&gt;CVE-2024-38577&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41011&#34;&gt;CVE-2024-41011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41042&#34;&gt;CVE-2024-41042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41098&#34;&gt;CVE-2024-41098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42114&#34;&gt;CVE-2024-42114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42228&#34;&gt;CVE-2024-42228&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42246&#34;&gt;CVE-2024-42246&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42259&#34;&gt;CVE-2024-42259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42265&#34;&gt;CVE-2024-42265&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42272&#34;&gt;CVE-2024-42272&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42276&#34;&gt;CVE-2024-42276&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42280&#34;&gt;CVE-2024-42280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42281&#34;&gt;CVE-2024-42281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42283&#34;&gt;CVE-2024-42283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42284&#34;&gt;CVE-2024-42284&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42285&#34;&gt;CVE-2024-42285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42286&#34;&gt;CVE-2024-42286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42287&#34;&gt;CVE-2024-42287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42288&#34;&gt;CVE-2024-42288&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42289&#34;&gt;CVE-2024-42289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42290&#34;&gt;CVE-2024-42290&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42292&#34;&gt;CVE-2024-42292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42295&#34;&gt;CVE-2024-42295&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42297&#34;&gt;CVE-2024-42297&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42301&#34;&gt;CVE-2024-42301&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42302&#34;&gt;CVE-2024-42302&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42304&#34;&gt;CVE-2024-42304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42305&#34;&gt;CVE-2024-42305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42306&#34;&gt;CVE-2024-42306&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42309&#34;&gt;CVE-2024-42309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42310&#34;&gt;CVE-2024-42310&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42311&#34;&gt;CVE-2024-42311&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42312&#34;&gt;CVE-2024-42312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42313&#34;&gt;CVE-2024-42313&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43828&#34;&gt;CVE-2024-43828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43829&#34;&gt;CVE-2024-43829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43830&#34;&gt;CVE-2024-43830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43834&#34;&gt;CVE-2024-43834&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43835&#34;&gt;CVE-2024-43835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43839&#34;&gt;CVE-2024-43839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43841&#34;&gt;CVE-2024-43841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43846&#34;&gt;CVE-2024-43846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43849&#34;&gt;CVE-2024-43849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43853&#34;&gt;CVE-2024-43853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43854&#34;&gt;CVE-2024-43854&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43856&#34;&gt;CVE-2024-43856&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43858&#34;&gt;CVE-2024-43858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43860&#34;&gt;CVE-2024-43860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43861&#34;&gt;CVE-2024-43861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43867&#34;&gt;CVE-2024-43867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43871&#34;&gt;CVE-2024-43871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43879&#34;&gt;CVE-2024-43879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43880&#34;&gt;CVE-2024-43880&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43882&#34;&gt;CVE-2024-43882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43883&#34;&gt;CVE-2024-43883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43884&#34;&gt;CVE-2024-43884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43889&#34;&gt;CVE-2024-43889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43890&#34;&gt;CVE-2024-43890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43892&#34;&gt;CVE-2024-43892&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43893&#34;&gt;CVE-2024-43893&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43894&#34;&gt;CVE-2024-43894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43905&#34;&gt;CVE-2024-43905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43907&#34;&gt;CVE-2024-43907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43908&#34;&gt;CVE-2024-43908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-43914&#34;&gt;CVE-2024-43914&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44935&#34;&gt;CVE-2024-44935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44944&#34;&gt;CVE-2024-44944&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44946&#34;&gt;CVE-2024-44946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44947&#34;&gt;CVE-2024-44947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44948&#34;&gt;CVE-2024-44948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44952&#34;&gt;CVE-2024-44952&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44954&#34;&gt;CVE-2024-44954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44960&#34;&gt;CVE-2024-44960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44965&#34;&gt;CVE-2024-44965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44968&#34;&gt;CVE-2024-44968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44971&#34;&gt;CVE-2024-44971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44974&#34;&gt;CVE-2024-44974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44987&#34;&gt;CVE-2024-44987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44988&#34;&gt;CVE-2024-44988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44989&#34;&gt;CVE-2024-44989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44990&#34;&gt;CVE-2024-44990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44995&#34;&gt;CVE-2024-44995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44998&#34;&gt;CVE-2024-44998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44999&#34;&gt;CVE-2024-44999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45003&#34;&gt;CVE-2024-45003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45006&#34;&gt;CVE-2024-45006&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45008&#34;&gt;CVE-2024-45008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45016&#34;&gt;CVE-2024-45016&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45018&#34;&gt;CVE-2024-45018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45021&#34;&gt;CVE-2024-45021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45025&#34;&gt;CVE-2024-45025&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45028&#34;&gt;CVE-2024-45028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46673&#34;&gt;CVE-2024-46673&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46674&#34;&gt;CVE-2024-46674&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46675&#34;&gt;CVE-2024-46675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46676&#34;&gt;CVE-2024-46676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46677&#34;&gt;CVE-2024-46677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46679&#34;&gt;CVE-2024-46679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46685&#34;&gt;CVE-2024-46685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46689&#34;&gt;CVE-2024-46689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46702&#34;&gt;CVE-2024-46702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46707&#34;&gt;CVE-2024-46707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46713&#34;&gt;CVE-2024-46713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46714&#34;&gt;CVE-2024-46714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46719&#34;&gt;CVE-2024-46719&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46721&#34;&gt;CVE-2024-46721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46722&#34;&gt;CVE-2024-46722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46723&#34;&gt;CVE-2024-46723&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46724&#34;&gt;CVE-2024-46724&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46725&#34;&gt;CVE-2024-46725&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46731&#34;&gt;CVE-2024-46731&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46737&#34;&gt;CVE-2024-46737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46738&#34;&gt;CVE-2024-46738&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46739&#34;&gt;CVE-2024-46739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46740&#34;&gt;CVE-2024-46740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46743&#34;&gt;CVE-2024-46743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46744&#34;&gt;CVE-2024-46744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46745&#34;&gt;CVE-2024-46745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46747&#34;&gt;CVE-2024-46747&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46750&#34;&gt;CVE-2024-46750&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46755&#34;&gt;CVE-2024-46755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46756&#34;&gt;CVE-2024-46756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46757&#34;&gt;CVE-2024-46757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46758&#34;&gt;CVE-2024-46758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46759&#34;&gt;CVE-2024-46759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46763&#34;&gt;CVE-2024-46763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46771&#34;&gt;CVE-2024-46771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46777&#34;&gt;CVE-2024-46777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46780&#34;&gt;CVE-2024-46780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46781&#34;&gt;CVE-2024-46781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46782&#34;&gt;CVE-2024-46782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46783&#34;&gt;CVE-2024-46783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46791&#34;&gt;CVE-2024-46791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46798&#34;&gt;CVE-2024-46798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46800&#34;&gt;CVE-2024-46800&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46804&#34;&gt;CVE-2024-46804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46814&#34;&gt;CVE-2024-46814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46815&#34;&gt;CVE-2024-46815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46817&#34;&gt;CVE-2024-46817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46818&#34;&gt;CVE-2024-46818&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46819&#34;&gt;CVE-2024-46819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46822&#34;&gt;CVE-2024-46822&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46828&#34;&gt;CVE-2024-46828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46829&#34;&gt;CVE-2024-46829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46840&#34;&gt;CVE-2024-46840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46844&#34;&gt;CVE-2024-46844&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;For Debian 10 buster, the corresponding linux-signed packages have also
been updated using the Freexian CA certificate. Note that in order to
boot the updated kernels using Secure Boot, the updated shim-signed
packages (which ship the Freexian CA) need to be installed. For more
information see &lt;a href=&#34;https://www.freexian.com/ela-1213-1-shim&#34;&gt;the shim announcement&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1218-1 asterisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1218-1-asterisk/</link>
      <pubDate>Sun, 27 Oct 2024 19:03:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1218-1-asterisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1218-1-asterisk/">
      
&lt;p&gt;Package : asterisk&lt;/p&gt;


&lt;p&gt;Version : 1:13.14.1~dfsg-2&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42365&#34;&gt;CVE-2024-42365&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;One issue has been found in asterisk, an Open Source Private Branch Exchange.&lt;/p&gt;
&lt;p&gt;CVE-2024-42365&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to a privilege escalation, remote code execution and/or
blind server-side request forgery with arbitrary protocol are
possible.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Thanks to Niels Galjaard, a minor privilege escalation has been fixed. More information about ths can be found at:
&lt;a href=&#34;https://alioth-lists.debian.net/pipermail/pkg-voip-maintainers/2024-July/038664.html&#34;&gt;https://alioth-lists.debian.net/pipermail/pkg-voip-maintainers/2024-July/038664.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Please be aware that this fix explicitly sets the gid of the asterisk process to &amp;ldquo;asterisk&amp;rdquo;.
In case you added the user asterisk to other groups, please update your systemd service file accordingly.
~&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1217-1 asterisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1217-1-asterisk/</link>
      <pubDate>Sun, 27 Oct 2024 18:41:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1217-1-asterisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1217-1-asterisk/">
      
&lt;p&gt;Package : asterisk&lt;/p&gt;


&lt;p&gt;Version : 1:16.28.0~dfsg-0&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42365&#34;&gt;CVE-2024-42365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42491&#34;&gt;CVE-2024-42491&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in asterisk, an Open Source Private Branch Exchange.&lt;/p&gt;
&lt;p&gt;CVE-2024-42365&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to a privilege escalation, remote code execution and/or
blind server-side request forgery with arbitrary protocol are
possible.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42491&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to bad handling of malformed Contact or Record-Route URI in an
incoming  SIP request, Asterisk might crash when res_resolver_unbound
is used.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Thanks to Niels Galjaard, a minor privilege escalation has been fixed. More information about ths can be found at:
&lt;a href=&#34;https://alioth-lists.debian.net/pipermail/pkg-voip-maintainers/2024-July/038664.html&#34;&gt;https://alioth-lists.debian.net/pipermail/pkg-voip-maintainers/2024-July/038664.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Please be aware that this fix explicitly sets the gid of the asterisk process to &amp;ldquo;asterisk&amp;rdquo;.
In case you added the user asterisk to other groups, please update your systemd service file accordingly.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1216-1 graphicsmagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1216-1-graphicsmagick/</link>
      <pubDate>Sun, 27 Oct 2024 14:49:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1216-1-graphicsmagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1216-1-graphicsmagick/">
      
&lt;p&gt;Package : graphicsmagick&lt;/p&gt;


&lt;p&gt;Version : 1.3.20-3&amp;#43;deb8u14 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21679&#34;&gt;CVE-2020-21679&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that a buffer overflow in GraphicsMagick, a collection
of image processing tools, could result in denial of service or potentially
in the execution of arbitrary code when converting crafted images to the PCX
format.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1215-1 python-cryptography security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1215-1-python-cryptography/</link>
      <pubDate>Sat, 26 Oct 2024 23:02:59 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1215-1-python-cryptography/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1215-1-python-cryptography/">
      
&lt;p&gt;Package : python-cryptography&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-3&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25659&#34;&gt;CVE-2020-25659&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Mitigation for Bleichenbacher attacks on RSA decryption has been added in python-cryptography, a Python library for cryptographic algorithms.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1214-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1214-1-distro-info-data/</link>
      <pubDate>Fri, 25 Oct 2024 09:49:27 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1214-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1214-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.36~bpo8&amp;#43;6 (jessie), 0.41&amp;#43;deb10u2~bpo9&amp;#43;6 (stretch), 0.41&amp;#43;deb10u10 (buster)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian
ELTS users.&lt;/p&gt;
&lt;p&gt;It adds Ubuntu 25.04.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1213-1 shim new certificates</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1213-1-shim/</link>
      <pubDate>Thu, 24 Oct 2024 14:10:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1213-1-shim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1213-1-shim/">
      
&lt;p&gt;Package : shim&lt;/p&gt;


&lt;p&gt;Version : 15.8-1~deb10u2 (buster)&lt;/p&gt;


      &lt;p&gt;In order to support Secure Boot in buster ELTS, the shim needs to have
the Freexian public certificate used to sign Linux kernels and other
packages. This update adds that certificate to the shim alongside
the Debian public CA, which allows to boot both old (signed by Debian)
and new (signed by Freexian) packages.&lt;/p&gt;
&lt;p&gt;The respective shim-signed package has also been updated to reflect
this change.&lt;/p&gt;
&lt;p&gt;In order to be able to boot future kernel security updates on setups
where Secure Boot is enabled, these shim packages need to be upgraded,
otherwise the old versions will not be able to verify the new signatures
and the bootloader will refuse to load those kernel versions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1212-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1212-1-samba/</link>
      <pubDate>Wed, 23 Oct 2024 12:29:57 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1212-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1212-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:4.2.14&amp;#43;dfsg-0&amp;#43;deb8u16 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2124&#34;&gt;CVE-2016-2124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44142&#34;&gt;CVE-2021-44142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2127&#34;&gt;CVE-2022-2127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3437&#34;&gt;CVE-2022-3437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32742&#34;&gt;CVE-2022-32742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4091&#34;&gt;CVE-2023-4091&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in Samba, SMB/CIFS file,
print, and login server for Unix.&lt;/p&gt;
&lt;p&gt;CVE-2016-2124&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the way samba implemented SMB1 authentication. An
attacker could use this flaw to retrieve the plaintext password sent over
the wire even if Kerberos authentication was required.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44142&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Orange Tsai reported an out-of-bounds heap write vulnerability in
the VFS module vfs_fruit, which could result in remote execution of
arbitrary code as root.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2127&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read in winbind AUTH_CRAP.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3437&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal des/des3 heap-based buffer overflow.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-32742&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Server memory information leak via SMB1.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4091&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Client can truncate files even with read-only permissions.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1211-1 libheif security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1211-1-libheif/</link>
      <pubDate>Tue, 22 Oct 2024 16:05:48 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1211-1-libheif/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1211-1-libheif/">
      
&lt;p&gt;Package : libheif&lt;/p&gt;


&lt;p&gt;Version : 1.3.2-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41311&#34;&gt;CVE-2024-41311&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential out-of-bounds read vulnerability
in &lt;a href=&#34;https://github.com/strukturag/libheif&#34;&gt;libheif&lt;/a&gt;, a decoder and encoder for
the HEIF and AVIF image formats.&lt;/p&gt;
&lt;p&gt;Insufficient checks in &lt;code&gt;ImageOverlay::parse()&lt;/code&gt; could have been exploited by an
overlay image with forged offsets which could in turn have led to undefined
behaviour.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1210-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1210-1-openjdk-11/</link>
      <pubDate>Tue, 22 Oct 2024 17:19:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1210-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1210-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.25&amp;#43;9-1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21208&#34;&gt;CVE-2024-21208&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21210&#34;&gt;CVE-2024-21210&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21217&#34;&gt;CVE-2024-21217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21235&#34;&gt;CVE-2024-21235&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, information disclosure or bypass
of Java sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1209-1 libsepol security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1209-1-libsepol/</link>
      <pubDate>Tue, 22 Oct 2024 14:01:17 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1209-1-libsepol/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1209-1-libsepol/">
      
&lt;p&gt;Package : libsepol&lt;/p&gt;


&lt;p&gt;Version : 2.6-2&amp;#43;deb9u1 (stretch), 2.8-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36084&#34;&gt;CVE-2021-36084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36085&#34;&gt;CVE-2021-36085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36086&#34;&gt;CVE-2021-36086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36087&#34;&gt;CVE-2021-36087&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in libsepol, a set of userspace
utilities and libraries for manipulating SELinux policies.&lt;/p&gt;
&lt;h3 id=&#34;cve-2021-36084-cve-2021-36085-cve-2021-36086&#34;&gt;CVE-2021-36084, CVE-2021-36085, CVE-2021-36086&lt;/h3&gt;
&lt;p&gt;Three use-after-free problems were discovered in the CIL compiler.  These
could lead to data corruption, denial of service or possibly arbitrary code
execution.&lt;/p&gt;
&lt;h3 id=&#34;cve-2021-36087&#34;&gt;CVE-2021-36087&lt;/h3&gt;
&lt;p&gt;A heap-based buffer over-read was discovered in the CIL compiler.  This could
lead to confidentiality or integrity violations, or crashes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1208-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1208-1-php5/</link>
      <pubDate>Sun, 20 Oct 2024 20:30:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1208-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1208-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u21 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8925&#34;&gt;CVE-2024-8925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8927&#34;&gt;CVE-2024-8927&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language, which could result in erroneous
parsing of &lt;code&gt;multipart/form-data&lt;/code&gt; or bypass of the &lt;code&gt;cgi.force_direct&lt;/code&gt;
directive.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-8925: Mihail Kirov discovered an erroneous parsing of
multipart form data contained in an HTTP POST request, which could
lead to legitimate data not being processed thereby violating data
integrity.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-8927: It was discovered that the &lt;code&gt;cgi.force_redirect&lt;/code&gt;
configuration setting is bypassable due to environment variable
collision.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1207-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1207-1-php7.0/</link>
      <pubDate>Sun, 20 Oct 2024 20:30:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1207-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1207-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8925&#34;&gt;CVE-2024-8925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8927&#34;&gt;CVE-2024-8927&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language, which could result in erroneous
parsing of &lt;code&gt;multipart/form-data&lt;/code&gt; or bypass of the &lt;code&gt;cgi.force_direct&lt;/code&gt;
directive.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-8925: Mihail Kirov discovered an erroneous parsing of
multipart form data contained in an HTTP POST request, which could
lead to legitimate data not being processed thereby violating data
integrity.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-8927: It was discovered that the &lt;code&gt;cgi.force_redirect&lt;/code&gt;
configuration setting is bypassable due to environment variable
collision.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1206-1 php7.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1206-1-php7.3/</link>
      <pubDate>Sun, 20 Oct 2024 20:30:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1206-1-php7.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1206-1-php7.3/">
      
&lt;p&gt;Package : php7.3&lt;/p&gt;


&lt;p&gt;Version : 7.3.31-1~deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8925&#34;&gt;CVE-2024-8925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8927&#34;&gt;CVE-2024-8927&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language, which could result in erroneous
parsing of &lt;code&gt;multipart/form-data&lt;/code&gt; or bypass of the &lt;code&gt;cgi.force_direct&lt;/code&gt;
directive.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-8925: Mihail Kirov discovered an erroneous parsing of
multipart form data contained in an HTTP POST request, which could
lead to legitimate data not being processed thereby violating data
integrity.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-8927: It was discovered that the &lt;code&gt;cgi.force_redirect&lt;/code&gt;
configuration setting is bypassable due to environment variable
collision.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1205-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1205-1-libreoffice/</link>
      <pubDate>Sat, 19 Oct 2024 14:25:54 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1205-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1205-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3&amp;#43;deb9u5 (stretch), 1:6.1.5-3&amp;#43;deb10u14 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7788&#34;&gt;CVE-2024-7788&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in libreoffice a popular office productivity suite.&lt;/p&gt;
&lt;p&gt;CVE-2024-7788:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Various file formats are based on the zip file format. In cases of corruption of the underlying zip&#39;s central directory, LibreOffice offers a &amp;quot;repair mode&amp;quot; which will attempt to recover the zip file structure by scanning for secondary local file headers in the zip to reconstruct the document.

Prior to this fix, in the case of digitally signed zip files, an attacker could construct a document which, when repaired, reported a signature status not valid for the recovered file.

Previously if verification failed the user could choose to ignore the failure and enable the macros anyway.

Repair document mode has to be inherently tolerant, so now in fixed versions all signatures are implied to be invalid in recovery mode.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1204-1 libapache-mod-jk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1204-1-libapache-mod-jk/</link>
      <pubDate>Mon, 14 Oct 2024 12:09:28 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1204-1-libapache-mod-jk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1204-1-libapache-mod-jk/">
      
&lt;p&gt;Package : libapache-mod-jk&lt;/p&gt;


&lt;p&gt;Version : 1:1.2.46-0&amp;#43;deb8u3 (jessie),  1:1.2.46-1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46544&#34;&gt;CVE-2024-46544&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an insecure configuration issue in
&lt;code&gt;libapache-mod-jk&lt;/code&gt;, an Apache web server module used to forward requests from
Apache to Tomcat using the AJP protocol.&lt;/p&gt;
&lt;p&gt;An issue with incorrect default permissions could have allowed local users to
view and modify shared memory containing &lt;code&gt;mod_jk&lt;/code&gt;&amp;rsquo;s configuration, which may
have potentially led to information disclosure and/or a denial of service
attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1203-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1203-1-samba/</link>
      <pubDate>Sat, 12 Oct 2024 09:43:32 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1203-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1203-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:4.5.16&amp;#43;dfsg-1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2124&#34;&gt;CVE-2016-2124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25717&#34;&gt;CVE-2020-25717&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44142&#34;&gt;CVE-2021-44142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2127&#34;&gt;CVE-2022-2127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3437&#34;&gt;CVE-2022-3437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32742&#34;&gt;CVE-2022-32742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4091&#34;&gt;CVE-2023-4091&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in Samba, SMB/CIFS file,
print, and login server for Unix.&lt;/p&gt;
&lt;p&gt;CVE-2016-2124&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the way samba implemented SMB1 authentication. An
attacker could use this flaw to retrieve the plaintext password sent over
the wire even if Kerberos authentication was required.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25717&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andrew Bartlett reported that Samba may map domain users to local
users in an undesired way, allowing for privilege escalation. The
update introduces a new parameter &amp;quot;min domain uid&amp;quot; (default to 1000)
to not accept a UNIX uid below this value.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44142&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Orange Tsai reported an out-of-bounds heap write vulnerability in
the VFS module vfs_fruit, which could result in remote execution of
arbitrary code as root.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2127&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read in winbind AUTH_CRAP.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3437&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal des/des3 heap-based buffer overflow.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-32742&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Server memory information leak via SMB1.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4091&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Client can truncate files even with read-only permissions.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1202-1 gtk&#43;2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1202-1-gtk&#43;2.0/</link>
      <pubDate>Mon, 07 Oct 2024 14:00:53 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1202-1-gtk&#43;2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1202-1-gtk&#43;2.0/">
      
&lt;p&gt;Package : gtk&amp;#43;2.0&lt;/p&gt;


&lt;p&gt;Version : 2.24.25-3&amp;#43;deb8u3 (jessie), 2.24.31-2&amp;#43;deb9u1 (stretch), 2.24.32-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6655&#34;&gt;CVE-2024-6655&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Modules were also searched in the current working directory in the GNOME toolkit gtk+2.0, allowing library injection.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1201-1 gtk&#43;3.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1201-1-gtk&#43;3.0/</link>
      <pubDate>Mon, 07 Oct 2024 13:58:29 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1201-1-gtk&#43;3.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1201-1-gtk&#43;3.0/">
      
&lt;p&gt;Package : gtk&amp;#43;3.0&lt;/p&gt;


&lt;p&gt;Version : 3.14.5-1&amp;#43;deb8u2 (jessie), 3.22.11-1&amp;#43;deb9u1 (stretch), 3.24.5-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6655&#34;&gt;CVE-2024-6655&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Modules were also searched in the current working directory in the GNOME toolkit gtk+3.0, allowing library injection.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1200-1 libgsf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1200-1-libgsf/</link>
      <pubDate>Mon, 07 Oct 2024 01:04:31 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1200-1-libgsf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1200-1-libgsf/">
      
&lt;p&gt;Package : libgsf&lt;/p&gt;


&lt;p&gt;Version : 1.14.41-1&amp;#43;deb9u1 (stretch), 1.14.45-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36474&#34;&gt;CVE-2024-36474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42415&#34;&gt;CVE-2024-42415&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Integer overflows have been fixed in libgsf, the GNOME Project G Structured File Library.&lt;/p&gt;
&lt;p&gt;CVE-2024-36474&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;directory integer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-42415&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sector allocation table integer overflow
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1199-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1199-1-cups/</link>
      <pubDate>Sun, 06 Oct 2024 19:37:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1199-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1199-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 2.2.1-8&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35235&#34;&gt;CVE-2024-35235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47175&#34;&gt;CVE-2024-47175&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in cups, the Common UNIX Printing System(tm).
This update introduces stronger validations of input data from external printers.&lt;/p&gt;
&lt;p&gt;Please be aware that now bugs in the firmware of the printer might be detected. In case of problems, that should appear in the error.log, please update this firmware first.&lt;/p&gt;
&lt;p&gt;The other issue is related to domain socket handling, where files might be overwritten.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1198-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1198-1-cups/</link>
      <pubDate>Sun, 06 Oct 2024 18:30:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1198-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1198-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 2.2.10-6&amp;#43;deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47175&#34;&gt;CVE-2024-47175&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in cups, the Common UNIX Printing System(tm).
This update introduces stronger validations of input data from external printers.&lt;/p&gt;
&lt;p&gt;Please be aware that now bugs in the firmware of the printer might be detected. In case of problems, that should appear in the error.log, please update this firmware first.&lt;/p&gt;
&lt;p&gt;This ELA also contains an update of CVE-2024-35235, where problems could arise when only domain sockets are used to send data to the printer.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1197-1 ntfs-3g security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1197-1-ntfs-3g/</link>
      <pubDate>Fri, 04 Oct 2024 23:29:03 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1197-1-ntfs-3g/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1197-1-ntfs-3g/">
      
&lt;p&gt;Package : ntfs-3g&lt;/p&gt;


&lt;p&gt;Version : 1:2016.2.22AR.1&amp;#43;dfsg-1&amp;#43;deb9u5 (stretch), 1:2017.3.23AR.3-4&amp;#43;deb11u4~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52890&#34;&gt;CVE-2023-52890&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Use-after-free in ntfs_uppercase_mbs() has been fixed in ntfs-3g, a read/write driver for the NTFS filesystem.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1196-1 e2fsprogs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1196-1-e2fsprogs/</link>
      <pubDate>Fri, 04 Oct 2024 17:25:40 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1196-1-e2fsprogs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1196-1-e2fsprogs/">
      
&lt;p&gt;Package : e2fsprogs&lt;/p&gt;


&lt;p&gt;Version : 1.42.12-2&amp;#43;deb8u3 (jessie), 1.43.4-2&amp;#43;deb9u3 (stretch), 1.44.5-1&amp;#43;deb10u4 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1304&#34;&gt;CVE-2022-1304&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out-of-bounds read/write vulnerability has been fixed in the e2fsck tool of the ext2/ext3/ext4 file system utilities e2fsprogs.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1195-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1195-1-libxml2/</link>
      <pubDate>Thu, 03 Oct 2024 23:48:50 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1195-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1195-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9318&#34;&gt;CVE-2016-9318&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An XML External Entity (XXE) attack via crafted documents has been fixed in the XML library libxml2.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1194-1 vlc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1194-1-vlc/</link>
      <pubDate>Thu, 03 Oct 2024 23:27:44 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1194-1-vlc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1194-1-vlc/">
      
&lt;p&gt;Package : vlc&lt;/p&gt;


&lt;p&gt;Version : 3.0.21-0&amp;#43;deb9u1 (stretch), 3.0.21-0&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-46461&#34;&gt;CVE-2024-46461&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow with MMS streams has been fixed by upgrading the VLC media player to the latest upstream version.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1192-1 mariadb-10.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1192-1-mariadb-10.3/</link>
      <pubDate>Thu, 03 Oct 2024 19:51:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1192-1-mariadb-10.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1192-1-mariadb-10.3/">
      
&lt;p&gt;Package : mariadb-10.3&lt;/p&gt;


&lt;p&gt;Version : 1:10.3.39-0&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21096&#34;&gt;CVE-2024-21096&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been fixed in MariaDB, a popular database server.&lt;/p&gt;
&lt;p&gt;CVE-2024-21096&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A difficult to exploit vulnerability allows unauthenticated
attacker with logon to the infrastructure where MariaDB Server
executes to compromise MariaDB Server.
Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of
MariaDB Server accessible data as well as unauthorized
read access to a subset of MariaDB Server accessible
data and unauthorized ability to cause a partial
denial of service (partial DoS)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that fixes related to CVE-2024-21096 may break forwards and backwards
compatibility in certain situations when doing logical backup and restore
with plain SQL files (e.g. when using &lt;code&gt;mariadb-dump&lt;/code&gt; or &lt;code&gt;mysqldump&lt;/code&gt;).&lt;/p&gt;
&lt;p&gt;The MariaDB client now has the command-line option &lt;code&gt;--sandbox&lt;/code&gt; and the
MariaDB client database prompt command &lt;code&gt;\-&lt;/code&gt;. This enables sandbox mode for
the rest of the session, until disconnected. Once in sandbox mode, any
command that could do something on the shell is disabled.&lt;/p&gt;
&lt;p&gt;Additionally &lt;code&gt;mysqldump&lt;/code&gt; now adds the following command inside a comment
at the very top of the logical SQL file to trigger sandbox mode:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;/*M!999999\- enable the sandbox mode */
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Newer version of MariaDB clients strip away the backslash and dash (-), and
then tries to execute the internal command with a dash.&lt;/p&gt;
&lt;p&gt;Older versions of MariaDB client and all versions of MySQL client considers
this a comment, and will ignore it. There may however be situations where
importing logical SQL dump files may fail due to this, so users should be
advised.&lt;/p&gt;
&lt;p&gt;Users are best protected from both security issues and interoperability
issues by using the latest &lt;code&gt;mariadb-dump&lt;/code&gt; shipped in MariaDB 11.4.3, 10.11.9,
10.6.19 and 10.5.26. The CVE-2024-21096 was officially fixed already in
11.4.2, but the latest batch of MariaDB minor maintenance releases include
further improvements on the sandbox mode.&lt;/p&gt;
&lt;p&gt;Note that the &lt;code&gt;mariadb-dump&lt;/code&gt; can be used to make the logical backups from
both MariaDB and MySQL servers. Also the &lt;code&gt;mariadb&lt;/code&gt; client program can connect
to both MariaDB and MySQL servers and import those SQL dump files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1193-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1193-1-zabbix/</link>
      <pubDate>Thu, 03 Oct 2024 19:42:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1193-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1193-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 2.2.23&amp;#43;dfsg-0&amp;#43;deb8u8 (jessie), 1:3.0.32&amp;#43;dfsg-0&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22114&#34;&gt;CVE-2024-22114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22116&#34;&gt;CVE-2024-22116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22122&#34;&gt;CVE-2024-22122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22123&#34;&gt;CVE-2024-22123&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a network
monitoring solution.&lt;/p&gt;
&lt;p&gt;CVE-2024-22114&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A user with no permission to any of the Hosts can access and view host
count &amp;amp; other statistics through System Information Widget in Global
View Dashboard.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22116&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An administrator with restricted permissions can exploit the script
execution functionality within the Monitoring Hosts section. The lack of
default escaping for script parameters enabled this user ability to
execute arbitrary code via the Ping script, thereby compromising
infrastructure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22119&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Stored XSS in graph items select form
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22122&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix allows to configure SMS notifications. AT command injection
occurs on &amp;quot;Zabbix Server&amp;quot; because there is no validation of &amp;quot;Number&amp;quot;
field on Web nor on Zabbix server side. Attacker can run test of SMS
providing specially crafted phone number and execute additional AT
commands on the modem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-22123&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Setting SMS media allows to set GSM modem file. Later this file is used
as Linux device. But due everything is a file for Linux, it is possible
to set another file, e.g. log file and zabbix_server will try to
communicate with it as modem. As a result, log file will be broken with
AT commands and small part for log file content will be leaked to UI.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1191-1 sqlite3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1191-1-sqlite3/</link>
      <pubDate>Mon, 30 Sep 2024 23:57:48 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1191-1-sqlite3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1191-1-sqlite3/">
      
&lt;p&gt;Package : sqlite3&lt;/p&gt;


&lt;p&gt;Version : 3.27.2-3&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19244&#34;&gt;CVE-2019-19244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36690&#34;&gt;CVE-2021-36690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-7104&#34;&gt;CVE-2023-7104&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the SQLite database.&lt;/p&gt;
&lt;p&gt;CVE-2019-19244&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mishandling of sub-select that uses both DISTINCT and window functions, and also has certain ORDER BY usage
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36690&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Expert extension segfault
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-7104&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Session extension buffer overread
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1190-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1190-1-expat/</link>
      <pubDate>Mon, 30 Sep 2024 13:51:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1190-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1190-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-6&amp;#43;deb8u12 (jessie), 2.2.0-2&amp;#43;deb9u9 (stretch), 2.2.6-2&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45490&#34;&gt;CVE-2024-45490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45491&#34;&gt;CVE-2024-45491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-45492&#34;&gt;CVE-2024-45492&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in expat, an XML parsing C library,
which could lead to Denial of Service, memory corruption or arbitrary
code execution.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-45490: TaiYou discovered that xmlparse.c does not reject a
negative length for &lt;code&gt;XML_ParseBuffer()&lt;/code&gt;, which may cause memory
corruption or code execution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-45491: TaiYou discovered that xmlparse.c has an integer
overflow for &lt;code&gt;nDefaultAtts&lt;/code&gt; on 32-bit platforms, which may cause
denial of service or code execution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-45492: TaiYou discovered that xmlparse.c has an integer
overflow for &lt;code&gt;m_groupSize&lt;/code&gt; on 32-bit platforms, which may cause
denial of service or code execution.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1189-1 mariadb-10.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1189-1-mariadb-10.1/</link>
      <pubDate>Mon, 30 Sep 2024 10:30:30 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1189-1-mariadb-10.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1189-1-mariadb-10.1/">
      
&lt;p&gt;Package : mariadb-10.1&lt;/p&gt;


&lt;p&gt;Version : 10.1.48-0&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46659&#34;&gt;CVE-2021-46659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21427&#34;&gt;CVE-2022-21427&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24048&#34;&gt;CVE-2022-24048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24050&#34;&gt;CVE-2022-24050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24051&#34;&gt;CVE-2022-24051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24052&#34;&gt;CVE-2022-24052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27380&#34;&gt;CVE-2022-27380&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27383&#34;&gt;CVE-2022-27383&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27384&#34;&gt;CVE-2022-27384&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27387&#34;&gt;CVE-2022-27387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27448&#34;&gt;CVE-2022-27448&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31622&#34;&gt;CVE-2022-31622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32083&#34;&gt;CVE-2022-32083&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been fixed in MariaDB, a popular database server.&lt;/p&gt;
&lt;p&gt;CVE-2022-21427&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols
to compromise MariaDB Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang
or frequently repeatable crash (complete DOS). Certain UTF8 combining
marks cause MariaDB to crash when doing Full-Text searches.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24048, CVE-2022-24051, CVE-2022-24052&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MariaDB CONNECT Storage Engine Stack-based Buffer
Overflow Privilege Escalation Vulnerability. This vulnerability allows
local attackers to escalate privileges on affected installations
of MariaDB. Authentication is required to exploit this vulnerability.
The specific flaw exists within the processing of SQL queries.
The issue results from the lack of proper validation of the length
of user-supplied data prior to copying it to a fixed-length stack-based
buffer. An attacker can leverage this vulnerability to escalate
privileges and execute arbitrary code in the context of the
service account. Concerned Storage Engines are JSON, XML and MYSQL.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24050&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MariaDB CONNECT Storage Engine use-after-free
privilege escalation vulnerability. This vulnerability allows local
attackers to escalate privileges on affected installations of MariaDB.
Authentication is required to exploit this vulnerability.
The specific flaw exists within the processing of SQL queries.
The issue results from the lack of validating the existence of an object
prior to performing operations on the object.
An attacker can leverage this vulnerability to escalate privileges and
execute arbitrary code in the context of the service account.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-27380&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue in the component my_decimal::operator=
of MariaDB Server was discovered that makes it possible for attackers to cause
a Denial of Service (DoS) via specially crafted SQL statements.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-27383&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An use-after-free was found in the component
my_strcasecmp_8bit, which may be exploited via specially crafted
SQL statements.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-27384, CVE-2022-32083&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue in the component
Item_subselect::init_expr_cache_tracker allows attackers to cause
a Denial of Service (DoS) via specially crafted SQL statements.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-27387&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A global buffer overflow in the component
decimal_bin_size was found, which is exploited via specially
crafted SQL statements.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-27448&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was found in multi-update and implicit
grouping handling, which is exploited via specially
crafted SQL statements.  An attacker can leverage
this vulnerability to cause a Denial of Service (DoS)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31622&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of errors while executing the
method create_worker_threads could lead to a Denial of Service (DoS).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1188-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1188-1-wireshark/</link>
      <pubDate>Mon, 30 Sep 2024 10:42:32 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1188-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1188-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 2.6.20-0&amp;#43;deb10u9~deb9u1 (stretch), 2.6.20-0&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0667&#34;&gt;CVE-2023-0667&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3649&#34;&gt;CVE-2023-3649&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4512&#34;&gt;CVE-2023-4512&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0211&#34;&gt;CVE-2024-0211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2955&#34;&gt;CVE-2024-2955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4853&#34;&gt;CVE-2024-4853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4854&#34;&gt;CVE-2024-4854&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8250&#34;&gt;CVE-2024-8250&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-8645&#34;&gt;CVE-2024-8645&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the network traffic analyzer Wireshark.&lt;/p&gt;
&lt;p&gt;CVE-2023-0667&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MSMMS dissector buffer overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3649&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;iSCSI dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4512&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CBOR dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-0211&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;DOCSIS dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-2955&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;T.38 dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-4853&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Editcap byte chopping crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-4854&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MONGO dissector infinite loop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-8250&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NTLMSSP dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-8645&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SPRT dissector crash
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1187-1 cups-filters security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1187-1-cups-filters/</link>
      <pubDate>Sun, 29 Sep 2024 23:47:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1187-1-cups-filters/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1187-1-cups-filters/">
      
&lt;p&gt;Package : cups-filters&lt;/p&gt;


&lt;p&gt;Version : 1.0.61-5&amp;#43;deb8u5 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47176&#34;&gt;CVE-2024-47176&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Simone Margaritelli an issue in cups-filters.
Multiple bugs in the cups-browsed component can result in the execution
of arbitrary commands without authentication when a print job is
started.&lt;/p&gt;
&lt;p&gt;(Jessie is only affected by CVE-2024-47176; the code for CVE-2024-47076 is not available)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1186-1 cups-filters security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1186-1-cups-filters/</link>
      <pubDate>Sun, 29 Sep 2024 23:44:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1186-1-cups-filters/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1186-1-cups-filters/">
      
&lt;p&gt;Package : cups-filters&lt;/p&gt;


&lt;p&gt;Version : 1.11.6-3&amp;#43;deb9u3 (stretch), 1.21.6-5&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47076&#34;&gt;CVE-2024-47076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-47176&#34;&gt;CVE-2024-47176&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Simone Margaritelli reported several vulnerabilities in cups-filters.
Missing validation of IPP attributes returned from an IPP server and
multiple bugs in the cups-browsed component can result in the execution
of arbitrary commands without authentication when a print job is
started.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1185-1 iproute2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1185-1-iproute2/</link>
      <pubDate>Sat, 28 Sep 2024 04:30:43 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1185-1-iproute2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1185-1-iproute2/">
      
&lt;p&gt;Package : iproute2&lt;/p&gt;


&lt;p&gt;Version : 4.20.0-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20795&#34;&gt;CVE-2019-20795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Use-after-free in get_netnsid_from_name() has been fixed in iproute2, a collection of utilities for controlling TCP/IP networking and traffic control.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1184-1 zeromq3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1184-1-zeromq3/</link>
      <pubDate>Sat, 28 Sep 2024 02:49:36 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1184-1-zeromq3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1184-1-zeromq3/">
      
&lt;p&gt;Package : zeromq3&lt;/p&gt;


&lt;p&gt;Version : 4.3.1-4&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20234&#34;&gt;CVE-2021-20234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20235&#34;&gt;CVE-2021-20235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20237&#34;&gt;CVE-2021-20237&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the messaging library ZeroMQ.&lt;/p&gt;
&lt;p&gt;CVE-2021-20234&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory leak in client induced by malicious server(s)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20235&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap overflow when receiving malformed ZMTP v1 packets
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20237&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory leak in PUB server induced by malicious client(s)
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1183-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1183-1-apache2/</link>
      <pubDate>Fri, 27 Sep 2024 19:58:15 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1183-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1183-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u29 (jessie), 2.4.25-3&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38474&#34;&gt;CVE-2024-38474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38475&#34;&gt;CVE-2024-38475&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Apache2, a popular webserver, was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2024-38474&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Substitution encoding issue in mod_rewrite in Apache HTTP Server
allowed and attacker to execute scripts in directories permitted
by the configuration but not directly reachable by any URL or
source disclosure of scripts meant to only to be executed as CGI.
Some RewriteRules that capture and substitute unsafely will
now fail unless rewrite flag &amp;quot;UnsafeAllow3F&amp;quot; is specified.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38475&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper escaping of output in mod_rewrite allowed an attacker
to map URLs to filesystem locations that are permitted
to be served by the server but are not intentionally/directly
reachable by any URL, resulting in code execution
or source code disclosure.
Substitutions in server context that use a backreferences
or variables as the first segment of the substitution are affected.
Some unsafe RewiteRules will be broken by this change
and the rewrite flag &amp;quot;UnsafePrefixStat&amp;quot; can be used
to opt back in once ensuring the substitution is
appropriately constrained.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1182-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1182-1-apache2/</link>
      <pubDate>Tue, 24 Sep 2024 21:48:30 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1182-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1182-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.59-1~deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38474&#34;&gt;CVE-2024-38474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38475&#34;&gt;CVE-2024-38475&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Apache2, a popular webserver, was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2024-38474&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Substitution encoding issue in mod_rewrite in Apache HTTP Server
allowed and attacker to execute scripts in directories permitted
by the configuration but not directly reachable by any URL or
source disclosure of scripts meant to only to be executed as CGI.
Some RewriteRules that capture and substitute unsafely will
now fail unless rewrite flag &amp;quot;UnsafeAllow3F&amp;quot; is specified.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38475&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper escaping of output in mod_rewrite allowed an attacker
to map URLs to filesystem locations that are permitted
to be served by the server but are not intentionally/directly
reachable by any URL, resulting in code execution
or source code disclosure.
Substitutions in server context that use a backreferences
or variables as the first segment of the substitution are affected.
Some unsafe RewiteRules will be broken by this change
and the rewrite flag &amp;quot;UnsafePrefixStat&amp;quot; can be used
to opt back in once ensuring the substitution is
appropriately constrained.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1181-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1181-1-libreoffice/</link>
      <pubDate>Tue, 17 Sep 2024 10:21:15 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1181-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1181-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3&amp;#43;deb9u4 (stretch), 1:6.1.5-3&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-6472&#34;&gt;CVE-2024-6472&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;libreoffice a popular office productivity software suite, was vulnerable.&lt;/p&gt;
&lt;p&gt;Certificate Validation user interface in LibreOffice allowed a potential vulnerability.
Signed macros are scripts that have been digitally signed by the developer
using a cryptographic signature.
When a document with a signed macro is opened a warning is displayed by LibreOffice
before the macro is executed.&lt;/p&gt;
&lt;p&gt;Previously, if verification failed the user could fail to understand the failure
and may choose to enable the macros anyway.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1180-1 libpam-tacplus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1180-1-libpam-tacplus/</link>
      <pubDate>Sun, 15 Sep 2024 23:39:19 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1180-1-libpam-tacplus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1180-1-libpam-tacplus/">
      
&lt;p&gt;Package : libpam-tacplus&lt;/p&gt;


&lt;p&gt;Version : 1.3.8-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-20014&#34;&gt;CVE-2016-20014&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Missing zeroing of a structure has been fixed in libpam-tacplus, a PAM module for using TACACS+ as an authentication service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1179-1 firmware-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1179-1-firmware-nonfree/</link>
      <pubDate>Sat, 14 Sep 2024 09:34:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1179-1-firmware-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1179-1-firmware-nonfree/">
      
&lt;p&gt;Package : firmware-nonfree&lt;/p&gt;


&lt;p&gt;Version : 20190114&amp;#43;really20220913-0&amp;#43;deb8u3 (jessie), 20190114&amp;#43;really20220913-0&amp;#43;deb9u3 (stretch), 20190114&amp;#43;really20220913-0&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35061&#34;&gt;CVE-2023-35061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38417&#34;&gt;CVE-2023-38417&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47210&#34;&gt;CVE-2023-47210&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Intel® has released two advisories about potential security vulnerabilities in some Intel® PROSet/Wireless WiFi, Bluetooth® and Killer™ WiFi products may allow information disclosurre or denial of service. The full advisories are available at [1] and [2].&lt;/p&gt;
&lt;p&gt;[1] &lt;a href=&#34;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html&#34;&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html&lt;/a&gt;
[2] &lt;a href=&#34;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html&#34;&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This updated firmware-nonfree package includes the following firmware files:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;  intel/ibt-0041-0041.sfi
  intel/ibt-17-16-1.sfi
  intel/ibt-17-2.sfi
  intel/ibt-18-16-1.sfi
  intel/ibt-18-2.sfi
  intel/ibt-19-0-0.sfi
  intel/ibt-19-0-1.sfi
  intel/ibt-19-0-4.sfi
  intel/ibt-19-16-4.sfi
  intel/ibt-19-240-1.sfi
  intel/ibt-19-240-4.sfi
  intel/ibt-19-32-0.sfi
  intel/ibt-19-32-1.sfi
  intel/ibt-19-32-4.sfi
  intel/ibt-20-0-3.sfi
  intel/ibt-20-1-3.sfi
  intel/ibt-20-1-4.sfi
  iwlwifi-Qu-b0-hr-b0-77.ucode
  iwlwifi-Qu-b0-jf-b0-77.ucode
  iwlwifi-Qu-c0-hr-b0-77.ucode
  iwlwifi-Qu-c0-jf-b0-77.ucode
  iwlwifi-QuZ-a0-hr-b0-77.ucode
  iwlwifi-QuZ-a0-jf-b0-77.ucode
  iwlwifi-cc-a0-77.ucode
  iwlwifi-so-a0-gf-a0-84.ucode
  iwlwifi-so-a0-gf-a0-86.ucode
  iwlwifi-so-a0-gf-a0.pnvm
  iwlwifi-so-a0-gf4-a0-84.ucode
  iwlwifi-so-a0-gf4-a0-86.ucode
  iwlwifi-so-a0-gf4-a0.pnvm
  iwlwifi-so-a0-hr-b0-83.ucode
  iwlwifi-so-a0-hr-b0-84.ucode
  iwlwifi-so-a0-hr-b0-86.ucode
  iwlwifi-ty-a0-gf-a0-84.ucode
  iwlwifi-ty-a0-gf-a0-86.ucode
  iwlwifi-ty-a0-gf-a0.pnvm
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The updated firmware files might need updated kernel to work and as old firmware versions might loaded
on older kernels, it is encouraged to verify whether the kernel loaded the updated firmware file and take
additional measures if needed.&lt;/p&gt;
&lt;p&gt;CVE-2023-35061&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper initialization for some Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38417&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation for some Intel® PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-47210&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation for some Intel® PROSet/Wireless WiFi software for linux before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1178-1 hsqldb1.8.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1178-1-hsqldb1.8.0/</link>
      <pubDate>Sat, 07 Sep 2024 18:45:14 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1178-1-hsqldb1.8.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1178-1-hsqldb1.8.0/">
      
&lt;p&gt;Package : hsqldb1.8.0&lt;/p&gt;


&lt;p&gt;Version : 1.8.0.10&amp;#43;dfsg-3&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1183&#34;&gt;CVE-2023-1183&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Arbitrary file write with a SCRIPT command was fixed in the Java database engine hsqldb1.8.0.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1177-1 bluez security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1177-1-bluez/</link>
      <pubDate>Sat, 07 Sep 2024 17:07:49 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1177-1-bluez/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1177-1-bluez/">
      
&lt;p&gt;Package : bluez&lt;/p&gt;


&lt;p&gt;Version : 5.43-2&amp;#43;deb9u8 (stretch), 5.50-1.2~deb10u6 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27349&#34;&gt;CVE-2023-27349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50229&#34;&gt;CVE-2023-50229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50230&#34;&gt;CVE-2023-50230&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in bluez, a library, tools and daemons for using Bluetooth devices.&lt;/p&gt;
&lt;p&gt;CVE-2023-27349 (stretch)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;AVRCP crash while handling unsupported events
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-50229&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Phone Book Access profile Heap-based Buffer Overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-50230&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Phone Book Access profile Heap-based Buffer Overflow
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1176-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1176-1-libxml2/</link>
      <pubDate>Sat, 07 Sep 2024 15:51:27 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1176-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1176-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u16 (jessie), 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u11 (stretch), 2.9.4&amp;#43;dfsg1-7&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-3709&#34;&gt;CVE-2016-3709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2309&#34;&gt;CVE-2022-2309&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been fixed in the XML library libxml2.&lt;/p&gt;
&lt;p&gt;CVE-2016-3709 (buster)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTML 4 parser cross-site scripting
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2309&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Parser NULL pointer dereference
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1175-1 dovecot security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1175-1-dovecot/</link>
      <pubDate>Sat, 07 Sep 2024 02:57:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1175-1-dovecot/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1175-1-dovecot/">
      
&lt;p&gt;Package : dovecot&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.27-3&amp;#43;deb9u8 (stretch), 1:2.3.4.1-5&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23185&#34;&gt;CVE-2024-23185&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A Denial of Service (DoS) vulnerability was discovered in the IMAP
implementation of the Dovecot mail server: Very large headers could
cause resource exhaustion when parsing message.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1174-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1174-1-postgresql-9.4/</link>
      <pubDate>Wed, 04 Sep 2024 15:42:21 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1174-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1174-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u10 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7348&#34;&gt;CVE-2024-7348&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Noah Misch discovered a race condition in the pg_dump tool included in
PostgreSQL, which may result in privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1173-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1173-1-postgresql-9.6/</link>
      <pubDate>Wed, 04 Sep 2024 15:42:10 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1173-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1173-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7348&#34;&gt;CVE-2024-7348&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Noah Misch discovered a race condition in the pg_dump tool included in
PostgreSQL, which may result in privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1172-1 postgresql-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1172-1-postgresql-11/</link>
      <pubDate>Wed, 04 Sep 2024 15:42:00 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1172-1-postgresql-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1172-1-postgresql-11/">
      
&lt;p&gt;Package : postgresql-11&lt;/p&gt;


&lt;p&gt;Version : 11.22-0&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7348&#34;&gt;CVE-2024-7348&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Noah Misch discovered a race condition in the pg_dump tool included in
PostgreSQL, which may result in privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1171-1 mariadb-10.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1171-1-mariadb-10.1/</link>
      <pubDate>Sun, 01 Sep 2024 14:33:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1171-1-mariadb-10.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1171-1-mariadb-10.1/">
      
&lt;p&gt;Package : mariadb-10.1&lt;/p&gt;


&lt;p&gt;Version : 10.1.48-0&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2154&#34;&gt;CVE-2021-2154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2166&#34;&gt;CVE-2021-2166&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2194&#34;&gt;CVE-2021-2194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2389&#34;&gt;CVE-2021-2389&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46657&#34;&gt;CVE-2021-46657&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46661&#34;&gt;CVE-2021-46661&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46663&#34;&gt;CVE-2021-46663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46664&#34;&gt;CVE-2021-46664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46665&#34;&gt;CVE-2021-46665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46666&#34;&gt;CVE-2021-46666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46667&#34;&gt;CVE-2021-46667&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46668&#34;&gt;CVE-2021-46668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46669&#34;&gt;CVE-2021-46669&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in MariaDB, a popular database server.&lt;/p&gt;
&lt;p&gt;CVE-2021-2154&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An easily exploitable vulnerability related to the UDF_INIT()
function, used by MariaDB allows
high privileged attacker with network access via multiple
protocols to compromise MariaDB Server.
Successful attacks of this vulnerability can result
in unauthorized ability to cause the server to hang or frequently
repeatable crashes.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-2166&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MySQL&#39;s SET plug-in variables wrongly locked making it possible for
high privileged attackers with network access to compromise the MariaDB
server, potentially causing Denial-of-Service (DoS).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-2194&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of filters related to full-text search could be used by
remote attackers to cause MariaDB Server to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-2389&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of SELECT and UPDATE queries on tables with full-text
indices may cause out-of-memory errors.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46657&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;get_sort_by_table in MariaDB could be used to cause an
application crash via certain subquery uses of ORDER BY.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46661&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of find functions in tables and lists makes it possible
to cause a DoS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46663&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of certain SELECT statements made it possible to crash
the MariaDB server by the use of ha_maria::extra application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46664&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MariaDB crash in sub_select_postjoin_aggr for a NULL value of aggr.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46665&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of used_tables makes it possible to cause MariaDB to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46666&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mishandling of HAVING and WHERE clauses allows attacker to produce a DoS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46667&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in sql_lex.cc may yield to an application crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46668&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;MariaDB crash via certain long
SELECT DISTINCT statements that improperly interact with
storage-engine resource limitations for temporary data structures.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46669&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;convert_const_to_int use-after-free when the BIGINT data type is used.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1170-1 roundcube security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1170-1-roundcube/</link>
      <pubDate>Fri, 30 Aug 2024 18:38:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1170-1-roundcube/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1170-1-roundcube/">
      
&lt;p&gt;Package : roundcube&lt;/p&gt;


&lt;p&gt;Version : 1.3.17&amp;#43;dfsg.1-1~deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42008&#34;&gt;CVE-2024-42008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42009&#34;&gt;CVE-2024-42009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42010&#34;&gt;CVE-2024-42010&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple cross-site scripting (XSS) vulnerabilities were discovered in
Roundcube, a skinnable AJAX based webmail solution for IMAP servers,
which could lead to privilege escalation, information disclosure or
denial of service.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-42008: Oskar Zeino-Mahmalat discovered that Roundcube allows
XSS in serving of attachments other than HTML or SVG.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-42009: Oskar Zeino-Mahmalat discovered that Roundcube allows
XSS in post-processing of sanitized HTML content.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-42010: Oskar Zeino-Mahmalat discovered an information leak
(access to remote content) due to insufficient CSS filtering.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1169-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1169-1-intel-microcode/</link>
      <pubDate>Thu, 29 Aug 2024 03:11:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1169-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1169-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20240813.1~deb8u1 (jessie), 3.20240813.1~deb9u1 (stretch), 3.20240813.1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42667&#34;&gt;CVE-2023-42667&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45733&#34;&gt;CVE-2023-45733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45745&#34;&gt;CVE-2023-45745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46103&#34;&gt;CVE-2023-46103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47855&#34;&gt;CVE-2023-47855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49141&#34;&gt;CVE-2023-49141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24853&#34;&gt;CVE-2024-24853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24980&#34;&gt;CVE-2024-24980&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25939&#34;&gt;CVE-2024-25939&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for some types of Intel CPUs and
provides mitigations for vulnerabilities that may allow a privileged user to
potentially enable escalation of privilege, partial information disclosure, or
denial of service via local access.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1168-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1168-1-bind9/</link>
      <pubDate>Wed, 28 Aug 2024 17:28:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1168-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1168-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.11.5.P4&amp;#43;dfsg-5.1&amp;#43;deb10u13 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4408&#34;&gt;CVE-2023-4408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1737&#34;&gt;CVE-2024-1737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1975&#34;&gt;CVE-2024-1975&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in BIND, a DNS server
implementation, which may result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1167-1 libtommath security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1167-1-libtommath/</link>
      <pubDate>Wed, 28 Aug 2024 10:43:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1167-1-libtommath/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1167-1-libtommath/">
      
&lt;p&gt;Package : libtommath&lt;/p&gt;


&lt;p&gt;Version : 0.42.0-1.1&amp;#43;deb8u1 (jessie), 1.0-4&amp;#43;deb9u1 (stretch), buster (1.1.0-3&amp;#43;deb10u1)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36328&#34;&gt;CVE-2023-36328&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a series of integer overflow vulnerabilities
in LibTomMath, a multiple-precision mathematics library.&lt;/p&gt;
&lt;p&gt;This could have led attackers to execute arbitrary code and/or cause a denial
of service (DoS).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1166-1 frr security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1166-1-frr/</link>
      <pubDate>Tue, 27 Aug 2024 23:45:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1166-1-frr/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1166-1-frr/">
      
&lt;p&gt;Package : frr&lt;/p&gt;


&lt;p&gt;Version : 7.5.1-1.1&amp;#43;deb10u3 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-44070&#34;&gt;CVE-2024-44070&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in frr, a routing suite of internet protocols (BGP, OSPF, IS-IS, &amp;hellip;)
Before using the TLV value, due to a missing length check of the remaining stream, one could read behind the buffer.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1165-1 systemd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1165-1-systemd/</link>
      <pubDate>Tue, 27 Aug 2024 19:11:32 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1165-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1165-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 232-25&amp;#43;deb9u17 (stretch), 241-7~deb10u11 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-7008&#34;&gt;CVE-2023-7008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50387&#34;&gt;CVE-2023-50387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50868&#34;&gt;CVE-2023-50868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in systemd, the default init system in Debian, when using systemd-resolved with DNSSEC.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1164-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1164-1-python-django/</link>
      <pubDate>Tue, 27 Aug 2024 15:41:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1164-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1164-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.11.29-1&amp;#43;deb10u12 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41989&#34;&gt;CVE-2024-41989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41991&#34;&gt;CVE-2024-41991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-42005&#34;&gt;CVE-2024-42005&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;&lt;em&gt;(Release for &lt;code&gt;buster&lt;/code&gt; only)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;A number of vulnerabilities were discovered in Django, a popular Python-based web development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-41989: The &lt;code&gt;floatformat&lt;/code&gt; template filter was subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-41991: Fix an issue where the &lt;code&gt;urlize&lt;/code&gt; and &lt;code&gt;urlizetrunc&lt;/code&gt; template filters (as well as the &lt;code&gt;AdminURLFieldWidget&lt;/code&gt; widget) were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-42005: Fix an issue where the &lt;code&gt;QuerySet.values()&lt;/code&gt; and &lt;code&gt;values_list()&lt;/code&gt; methods on models with a &lt;code&gt;JSONFields&lt;/code&gt; were subject to a SQL injection attack through column aliases via a crafted JSON object key.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1163-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1163-1-python-django/</link>
      <pubDate>Tue, 27 Aug 2024 13:48:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1163-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1163-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u17 (jessie), 1:1.10.7-2&amp;#43;deb9u23 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-41989&#34;&gt;CVE-2024-41989&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;&lt;em&gt;(Release for &lt;code&gt;jessie&lt;/code&gt; and &lt;code&gt;stretch&lt;/code&gt; only)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;A Denial of Service (DoS) vulnerability was discovered in Django, a popular
Python-based web development framework.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;floatformat&lt;/code&gt; template filter was subject to significant memory consumption
when given a string representation of a number in scientific notation with a
large exponent.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1162-1 suricata security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1162-1-suricata/</link>
      <pubDate>Tue, 27 Aug 2024 12:17:40 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1162-1-suricata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1162-1-suricata/">
      
&lt;p&gt;Package : suricata&lt;/p&gt;


&lt;p&gt;Version : 1:4.1.2-2&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10050&#34;&gt;CVE-2019-10050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10051&#34;&gt;CVE-2019-10051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10052&#34;&gt;CVE-2019-10052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10053&#34;&gt;CVE-2019-10053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10054&#34;&gt;CVE-2019-10054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10055&#34;&gt;CVE-2019-10055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10056&#34;&gt;CVE-2019-10056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15699&#34;&gt;CVE-2019-15699&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16410&#34;&gt;CVE-2019-16410&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16411&#34;&gt;CVE-2019-16411&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18625&#34;&gt;CVE-2019-18625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18792&#34;&gt;CVE-2019-18792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1010279&#34;&gt;CVE-2019-1010279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35063&#34;&gt;CVE-2021-35063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37592&#34;&gt;CVE-2021-37592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37151&#34;&gt;CVE-2024-37151&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in intrusion detection system (IDS) and intrusion prevention system (IPS) Suricata.&lt;/p&gt;
&lt;p&gt;CVE-2019-10050&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer over-read in DecodeMPLS()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10051&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect SMB1 filename parsing
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10052&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect DHCP parsing
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10053&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap overflow in SSHParseBanner()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10054&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in NFS process_reply_record_v3()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10055&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Crash in ftp_pasv_response()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10056&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Crash in DecodeEthernet()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15699&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory overread in TLSDecodeHSHelloExtensions()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-16410&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory overread in Defrag4Reassemble()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-16411&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Overread in IPV4OptValidateTimestamp()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-18625&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SYN_SENT RST/FIN injection
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-18792&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reject broken TCP ACK packets
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-1010279&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;TCP/HTTP detection bypass
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-35063&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;TCP evasion
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37592&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;TCP evasion
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-37151&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;id reuse can lead to invalid reassembly
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1161-1 libvirt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1161-1-libvirt/</link>
      <pubDate>Sun, 25 Aug 2024 14:20:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1161-1-libvirt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1161-1-libvirt/">
      
&lt;p&gt;Package : libvirt&lt;/p&gt;


&lt;p&gt;Version : 1.2.9-9&amp;#43;deb8u8 (jessie), 3.0.0-4&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3631&#34;&gt;CVE-2021-3631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3975&#34;&gt;CVE-2021-3975&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0897&#34;&gt;CVE-2022-0897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1441&#34;&gt;CVE-2024-1441&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2494&#34;&gt;CVE-2024-2494&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2496&#34;&gt;CVE-2024-2496&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issue have been found in libvirt, a library for interfacing with different virtualization systems.
The issues are related to use-after-free, an off-by-one, a null pointer dereference and badly handled mutex, which could be used for a denial of service.
The other issues are related to privilege escalation and breaking out of the sVirt confinement.&lt;/p&gt;
&lt;p&gt;(strictly speaking CVE-2021-3975 only affects Stretch)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1160-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1160-1-tiff/</link>
      <pubDate>Sat, 24 Aug 2024 00:59:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1160-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1160-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u17 (jessie), 4.0.8-2&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3576&#34;&gt;CVE-2023-3576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52356&#34;&gt;CVE-2023-52356&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in tiff, a Tag Image File Format (TIFF) library with tools.
Using crafted TIFF files an attacker would be able to cause a segmentation fault or
a memory leak, which may result in an application crash and denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1159-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1159-1-apache2/</link>
      <pubDate>Fri, 23 Aug 2024 11:08:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1159-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1159-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.25-3&amp;#43;deb9u18 (stretch), 2.4.59-1~deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36387&#34;&gt;CVE-2024-36387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38476&#34;&gt;CVE-2024-38476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38477&#34;&gt;CVE-2024-38477&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39573&#34;&gt;CVE-2024-39573&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39884&#34;&gt;CVE-2024-39884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-40725&#34;&gt;CVE-2024-40725&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found on apache, a popular webserver.&lt;/p&gt;
&lt;p&gt;CVE-2024-36387&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Serving WebSocket protocol upgrades over a HTTP/2 connection could
result in a NULL Pointer dereference, leading to a crash of the
server process
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38476&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Backend application whose reponse headers are malicious
rendered apache2 vulnerable to SSRF
(Server-side Request Forgery) and local script execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38477&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference was found in
mod_proxy allowing an attacker to crash the server via
a malicious request.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39573&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential SSRF in mod_rewrite allowed an
attacker to cause unsafe RewriteRules to unexpectedly
setup URL&#39;s to be handled by mod_proxy.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39884&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A regression of CVE-2024-38476 in the core of Apache
HTTP Server ignores some use of the legacy content-type based
configuration of handlers. &amp;quot;AddType&amp;quot; and similar configuration,
under some circumstances where files are requested indirectly,
result in source code disclosure of local content. For example,
PHP scripts may be served instead of interpreted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-40725&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A partial fix for CVE-2024-38476 in the core of
Apache HTTP Server ignores some use of the legacy content-type based
configuration of handlers. &amp;quot;AddType&amp;quot; and similar configuration,
under some circumstances where files are requested indirectly,
result in source code disclosure of local content. For example,
PHP scripts may be served instead of interpreted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Moreover a functionality bug was fixed in webdav list of well known
browser by adding dolphin and Konqueror/5 browsers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1158-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1158-1-apache2/</link>
      <pubDate>Thu, 22 Aug 2024 20:09:55 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1158-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1158-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u28 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38476&#34;&gt;CVE-2024-38476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38477&#34;&gt;CVE-2024-38477&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39573&#34;&gt;CVE-2024-39573&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39884&#34;&gt;CVE-2024-39884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-40725&#34;&gt;CVE-2024-40725&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found on apache, a popular webserver.&lt;/p&gt;
&lt;p&gt;CVE-2024-38476&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Backend application whose reponse headers are malicious
rendered apache2 vulnerable to SSRF
(Server-side Request Forgery) and local script execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-38477&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference was found in
mod_proxy allowing an attacker to crash the server via
a malicious request.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39573&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential SSRF in mod_rewrite allowed an
attacker to cause unsafe RewriteRules to unexpectedly
setup URL&#39;s to be handled by mod_proxy.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-39884&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A regression of CVE-2024-38476 in the core of Apache
HTTP Server ignores some use of the legacy content-type based
configuration of handlers. &amp;quot;AddType&amp;quot; and similar configuration,
under some circumstances where files are requested indirectly,
result in source code disclosure of local content. For example,
PHP scripts may be served instead of interpreted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-40725&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A partial fix for CVE-2024-38476 in the core of
Apache HTTP Server ignores some use of the legacy content-type based
configuration of handlers. &amp;quot;AddType&amp;quot; and similar configuration,
under some circumstances where files are requested indirectly,
result in source code disclosure of local content. For example,
PHP scripts may be served instead of interpreted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Moreover a functionality bug was fixed in webdav list of well known
browser by adding dolphin and Konqueror/5 browsers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1157-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1157-1-glib2.0/</link>
      <pubDate>Mon, 19 Aug 2024 08:54:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1157-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1157-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.42.1-1&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34397&#34;&gt;CVE-2024-34397&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Alicia Boya Garcia reported that the GDBus signal subscriptions in the GLib
library are prone to a spoofing vulnerability. A local attacker can take
advantage of this flaw to cause a GDBus-based client to behave incorrectly,
with an application-dependent impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1156-1 indent security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1156-1-indent/</link>
      <pubDate>Sat, 17 Aug 2024 23:57:21 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1156-1-indent/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1156-1-indent/">
      
&lt;p&gt;Package : indent&lt;/p&gt;


&lt;p&gt;Version : 2.2.12-1&amp;#43;deb11u1~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40305&#34;&gt;CVE-2023-40305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0911&#34;&gt;CVE-2024-0911&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues have been fixed in GNU indent, a C source code formatter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1152-1 dnsmasq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1152-1-dnsmasq/</link>
      <pubDate>Sat, 17 Aug 2024 18:10:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1152-1-dnsmasq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1152-1-dnsmasq/">
      
&lt;p&gt;Package : dnsmasq&lt;/p&gt;


&lt;p&gt;Version : 2.80-1&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14834&#34;&gt;CVE-2019-14834&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3448&#34;&gt;CVE-2021-3448&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0934&#34;&gt;CVE-2022-0934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28450&#34;&gt;CVE-2023-28450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the dnsmasq package, the small caching DNS proxy and DHCP/TFTP server.&lt;/p&gt;
&lt;h3 id=&#34;cve-2019-14834&#34;&gt;CVE-2019-14834&lt;/h3&gt;
&lt;p&gt;A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a
denial of service (memory consumption) via vectors involving DHCP response creation.&lt;/p&gt;
&lt;h3 id=&#34;cve-2021-3448&#34;&gt;CVE-2021-3448&lt;/h3&gt;
&lt;p&gt;A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network
interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing
port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by
dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to
data integrity.&lt;/p&gt;
&lt;h3 id=&#34;cve-2022-0934&#34;&gt;CVE-2022-0934&lt;/h3&gt;
&lt;p&gt;A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends
a crafted packet processed by dnsmasq, potentially causing a denial of service.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-28450&#34;&gt;CVE-2023-28450&lt;/h3&gt;
&lt;p&gt;An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but
should be 1232 because of DNS Flag Day 2020.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1155-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1155-1-git/</link>
      <pubDate>Sat, 17 Aug 2024 08:15:19 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1155-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1155-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.1.4-2.1&amp;#43;deb8u14 (jessie), 1:2.11.0-3&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1387&#34;&gt;CVE-2019-1387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25652&#34;&gt;CVE-2023-25652&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25815&#34;&gt;CVE-2023-25815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29007&#34;&gt;CVE-2023-29007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32002&#34;&gt;CVE-2024-32002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32021&#34;&gt;CVE-2024-32021&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in git, a fast, scalable and
distributed revision control system.&lt;/p&gt;
&lt;h3 id=&#34;cve-2019-1387&#34;&gt;CVE-2019-1387&lt;/h3&gt;
&lt;p&gt;It was possible to bypass the previous check for this vulnerability using
parallel cloning, or the &amp;ndash;recurse-submodules option to git-checkout(1).
(applicable to Debian &amp;ldquo;stretch&amp;rdquo; only)&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-25652&#34;&gt;CVE-2023-25652&lt;/h3&gt;
&lt;p&gt;Feeding specially-crafted input to &amp;lsquo;git apply &amp;ndash;reject&amp;rsquo; could overwrite a path
outside the working tree with partially controlled contents, corresponding to
the rejected hunk or hunks from the given patch.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-25815&#34;&gt;CVE-2023-25815&lt;/h3&gt;
&lt;p&gt;Low-privileged users could inject malicious messages into Git&amp;rsquo;s output under
MINGW.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-29007&#34;&gt;CVE-2023-29007&lt;/h3&gt;
&lt;p&gt;A specially-crafted .gitmodules file with submodule URLs longer than 1024
characters could be used to inject arbitrary configuration into
$GIT_DIR/config.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-32002&#34;&gt;CVE-2024-32002&lt;/h3&gt;
&lt;p&gt;Repositories with submodules could be specially-crafted to write hooks into
.git/ which would then be executed during an ongoing clone operation.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-32004&#34;&gt;CVE-2024-32004&lt;/h3&gt;
&lt;p&gt;A specially-crafted local repository could cause the execution of arbitrary
code when cloned by another user.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-32021&#34;&gt;CVE-2024-32021&lt;/h3&gt;
&lt;p&gt;When cloning a local repository that contains symlinks via the filesystem, Git
could have created hardlinks to arbitrary user-readable files on the same
filesystem as the target repository in the objects/ directory.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-32465&#34;&gt;CVE-2024-32465&lt;/h3&gt;
&lt;p&gt;When cloning a local repository obtained from a downloaded archive, hooks in
that repository could be used for arbitrary code execution.&lt;/p&gt;
&lt;p&gt;(Updates for Debian &amp;ldquo;buster&amp;rdquo; were announced in DLA-3844-1, during the Debian
LTS support period.)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1154-1 util-linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1154-1-util-linux/</link>
      <pubDate>Thu, 15 Aug 2024 21:02:29 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1154-1-util-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1154-1-util-linux/">
      
&lt;p&gt;Package : util-linux&lt;/p&gt;


&lt;p&gt;Version : 2.26.2&amp;#43;really2.25.2-6&amp;#43;deb8u2 (jessie), 2.29.2-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28085&#34;&gt;CVE-2024-28085&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Skyler Ferrante discovered that the &lt;code&gt;wall(1)&lt;/code&gt; utility found in
&lt;code&gt;util-linux&lt;/code&gt;, a collection of system utilities for Linux, does not
filter escape sequences from command line arguments.  This allows
unprivileged local users to put arbitrary text on other users
terminals if &lt;code&gt;mesg&lt;/code&gt; is set to ‘y’ and the &lt;code&gt;wall&lt;/code&gt; executable is setgid,
which could lead to information disclosure.&lt;/p&gt;
&lt;p&gt;With this update the wall executable is no longer installed setgid
&lt;code&gt;tty&lt;/code&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1153-1 wpa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1153-1-wpa/</link>
      <pubDate>Wed, 14 Aug 2024 21:42:19 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1153-1-wpa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1153-1-wpa/">
      
&lt;p&gt;Package : wpa&lt;/p&gt;


&lt;p&gt;Version : 2.3-1&amp;#43;deb8u15 (jessie), 2:2.4-1&amp;#43;deb9u11 (stretch), 2:2.7&amp;#43;git20190128&amp;#43;0c1e29f-6&amp;#43;deb10u5 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5290&#34;&gt;CVE-2024-5290&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Local privilege escalation by loading libraries from untrusted paths has been fixed in wpasupplicant, a commonly used tool for connection and authentication in wireless and wired networks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1151-1 gdk-pixbuf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1151-1-gdk-pixbuf/</link>
      <pubDate>Tue, 13 Aug 2024 16:53:04 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1151-1-gdk-pixbuf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1151-1-gdk-pixbuf/">
      
&lt;p&gt;Package : gdk-pixbuf&lt;/p&gt;


&lt;p&gt;Version : 2.31.1-2&amp;#43;deb8u10 (jessie), 2.36.5-2&amp;#43;deb9u3 (stretch), 2.38.1&amp;#43;dfsg-1&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48622&#34;&gt;CVE-2022-48622&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Memory corruption has been fixed in the loader for ANI (animated cursors) files in GDK Pixbuf, a library used by the GTK widget toolkit.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1150-1 ruby2.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1150-1-ruby2.5/</link>
      <pubDate>Tue, 13 Aug 2024 13:06:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1150-1-ruby2.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1150-1-ruby2.5/">
      
&lt;p&gt;Package : ruby2.5&lt;/p&gt;


&lt;p&gt;Version : 2.5.5-3&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36617&#34;&gt;CVE-2023-36617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27280&#34;&gt;CVE-2024-27280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27281&#34;&gt;CVE-2024-27281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27282&#34;&gt;CVE-2024-27282&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the interpreter for
the Ruby language, which may result in denial-of-service (DoS),
information leak, and remote code execution.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-36617&lt;/p&gt;
&lt;p&gt;Follow-up fix for CVE-2023-28755.&lt;/p&gt;
&lt;p&gt;A ReDoS issue was discovered in the URI component. The URI parser
mishandles invalid URLs that have specific characters. It causes
an increase in execution time for parsing strings to URI objects.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27280&lt;/p&gt;
&lt;p&gt;A buffer-overread issue was discovered in StringIO. The ungetbyte
and ungetc methods on a StringIO can read past the end of a
string, and a subsequent call to StringIO.gets may return the
memory value.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27281&lt;/p&gt;
&lt;p&gt;When parsing .rdoc_options (used for configuration in RDoc) as a
YAML file, object injection and resultant remote code execution
are possible because there are no restrictions on the classes that
can be restored. (When loading the documentation cache, object
injection and resultant remote code execution are also possible if
there were a crafted cache.)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27282&lt;/p&gt;
&lt;p&gt;If attacker-supplied data is provided to the Ruby regex compiler,
it is possible to extract arbitrary heap data relative to the
start of the text, including pointers and sensitive strings.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1149-1 ruby2.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1149-1-ruby2.3/</link>
      <pubDate>Tue, 13 Aug 2024 13:06:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1149-1-ruby2.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1149-1-ruby2.3/">
      
&lt;p&gt;Package : ruby2.3&lt;/p&gt;


&lt;p&gt;Version : 2.3.3-1&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28965&#34;&gt;CVE-2021-28965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33621&#34;&gt;CVE-2021-33621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28739&#34;&gt;CVE-2022-28739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28755&#34;&gt;CVE-2023-28755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28756&#34;&gt;CVE-2023-28756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36617&#34;&gt;CVE-2023-36617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27281&#34;&gt;CVE-2024-27281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27282&#34;&gt;CVE-2024-27282&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the interpreter for
the Ruby language, which may result in denial-of-service (DoS),
information leak, HTTP response splitting, XML round-trip issues, and
remote code execution.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-28965&lt;/p&gt;
&lt;p&gt;The REXML gem does not properly address XML round-trip issues. An
incorrect document can be produced after parsing and serializing.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-33621&lt;/p&gt;
&lt;p&gt;The cgi gem allows HTTP response splitting. This is relevant to
applications that use untrusted user input either to generate an
HTTP response or to create a CGI::Cookie object.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-28739&lt;/p&gt;
&lt;p&gt;Buffer over-read occurs in String-to-Float conversion, including
Kernel#Float and String#to_f.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-28755, CVE-2023-36617&lt;/p&gt;
&lt;p&gt;A ReDoS issue was discovered in the URI component. The URI parser
mishandles invalid URLs that have specific characters. It causes
an increase in execution time for parsing strings to URI objects.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-28756&lt;/p&gt;
&lt;p&gt;A ReDoS issue was discovered in the Time component. The Time
parser mishandles invalid URLs that have specific characters. It
causes an increase in execution time for parsing strings to Time
objects.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27281&lt;/p&gt;
&lt;p&gt;When parsing .rdoc_options (used for configuration in RDoc) as a
YAML file, object injection and resultant remote code execution
are possible because there are no restrictions on the classes that
can be restored. (When loading the documentation cache, object
injection and resultant remote code execution are also possible if
there were a crafted cache.)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27282&lt;/p&gt;
&lt;p&gt;If attacker-supplied data is provided to the Ruby regex compiler,
it is possible to extract arbitrary heap data relative to the
start of the text, including pointers and sensitive strings.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1148-1 ruby2.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1148-1-ruby2.1/</link>
      <pubDate>Tue, 13 Aug 2024 13:06:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1148-1-ruby2.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1148-1-ruby2.1/">
      
&lt;p&gt;Package : ruby2.1&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-2&amp;#43;deb8u14 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2338&#34;&gt;CVE-2016-2338&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28965&#34;&gt;CVE-2021-28965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33621&#34;&gt;CVE-2021-33621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41817&#34;&gt;CVE-2021-41817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28739&#34;&gt;CVE-2022-28739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28756&#34;&gt;CVE-2023-28756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27281&#34;&gt;CVE-2024-27281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27282&#34;&gt;CVE-2024-27282&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the interpreter for
the Ruby language, which may result in denial-of-service (DoS),
information leak, HTTP response splitting, XML round-trip issues, and
remote code execution.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-28965&lt;/p&gt;
&lt;p&gt;The REXML gem does not properly address XML round-trip issues. An
incorrect document can be produced after parsing and serializing.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-33621&lt;/p&gt;
&lt;p&gt;The cgi gem allows HTTP response splitting. This is relevant to
applications that use untrusted user input either to generate an
HTTP response or to create a CGI::Cookie object.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-28739&lt;/p&gt;
&lt;p&gt;Buffer over-read occurs in String-to-Float conversion, including
Kernel#Float and String#to_f.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-28756&lt;/p&gt;
&lt;p&gt;A ReDoS issue was discovered in the Time component. The Time
parser mishandles invalid URLs that have specific characters. It
causes an increase in execution time for parsing strings to Time
objects.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27281&lt;/p&gt;
&lt;p&gt;When parsing .rdoc_options (used for configuration in RDoc) as a
YAML file, object injection and resultant remote code execution
are possible because there are no restrictions on the classes that
can be restored. (When loading the documentation cache, object
injection and resultant remote code execution are also possible if
there were a crafted cache.)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-27282&lt;/p&gt;
&lt;p&gt;If attacker-supplied data is provided to the Ruby regex compiler,
it is possible to extract arbitrary heap data relative to the
start of the text, including pointers and sensitive strings.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This release also provide follow-up fixes for CVE-2016-2338
(ELA-1148-1) and CVE-2021-41817 (ELA-531-1).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1147-1 python-aiosmtpd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1147-1-python-aiosmtpd/</link>
      <pubDate>Mon, 12 Aug 2024 16:39:23 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1147-1-python-aiosmtpd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1147-1-python-aiosmtpd/">
      
&lt;p&gt;Package : python-aiosmtpd&lt;/p&gt;


&lt;p&gt;Version : 1.2-3&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27305&#34;&gt;CVE-2024-27305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34083&#34;&gt;CVE-2024-34083&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been fixed in python-aiosmtpd, an asyncio based SMTP server.&lt;/p&gt;
&lt;p&gt;CVE-2024-27305&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SMTP smuggling with non-standard line endings
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-34083&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;STARTTLS unencrypted command injection
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1146-1 openjdk-11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1146-1-openjdk-11/</link>
      <pubDate>Wed, 07 Aug 2024 09:41:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1146-1-openjdk-11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1146-1-openjdk-11/">
      
&lt;p&gt;Package : openjdk-11&lt;/p&gt;


&lt;p&gt;Version : 11.0.24&amp;#43;8-2~deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21131&#34;&gt;CVE-2024-21131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21138&#34;&gt;CVE-2024-21138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21140&#34;&gt;CVE-2024-21140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21144&#34;&gt;CVE-2024-21144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21145&#34;&gt;CVE-2024-21145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21147&#34;&gt;CVE-2024-21147&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, information disclosure or bypass
of Java sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1145-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1145-1-curl/</link>
      <pubDate>Mon, 05 Aug 2024 21:13:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1145-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1145-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u28 (jessie), 7.52.1-5&amp;#43;deb9u22 (stretch), 7.64.0-4&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-7264&#34;&gt;CVE-2024-7264&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A denial-of-service vulnerability was found in cURL, an easy-to-use client-side
URL transfer library. libcurl&amp;rsquo;s ASN1 parser code has the GTime2str() function,
used for parsing an ASN.1 Generalized Time field. If given an syntactically
incorrect field, the parser might end up crashing but this flaw can also lead
to heap contents getting returned to the application when CURLINFO_CERTINFO is
used.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1144-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1144-1-exim4/</link>
      <pubDate>Wed, 31 Jul 2024 23:08:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1144-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1144-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.89-2&amp;#43;deb9u13 (stretch), 4.92-8&amp;#43;deb10u10 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39929&#34;&gt;CVE-2024-39929&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in exim4, the Mail Transport Agent.
Due to bad parsing of multiline RFC 2231 header filenames in mime ACL,
a remote attacker could bypass this protection mechanism and potentially
deliver executable attachements to mailboxes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1143-1 aom security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1143-1-aom/</link>
      <pubDate>Wed, 31 Jul 2024 23:55:34 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1143-1-aom/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1143-1-aom/">
      
&lt;p&gt;Package : aom&lt;/p&gt;


&lt;p&gt;Version : 1.0.0-3&amp;#43;deb10u2 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5171&#34;&gt;CVE-2024-5171&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Integer overflows have been fixed in aom, an AV1 Codec Library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1142-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1142-1-openjdk-8/</link>
      <pubDate>Tue, 30 Jul 2024 10:55:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1142-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1142-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u422-b05-1~deb8u1 (jessie), 8u422-b05-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21131&#34;&gt;CVE-2024-21131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21138&#34;&gt;CVE-2024-21138&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21140&#34;&gt;CVE-2024-21140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21144&#34;&gt;CVE-2024-21144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21145&#34;&gt;CVE-2024-21145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21147&#34;&gt;CVE-2024-21147&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in bypass of sandbox restrictions, information
disclosure or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1141-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1141-1-krb5/</link>
      <pubDate>Mon, 29 Jul 2024 22:35:11 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1141-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1141-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-19&amp;#43;deb8u9 (jessie), 1.15-1&amp;#43;deb9u6 (stretch), 1.17-3&amp;#43;deb10u7 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26458&#34;&gt;CVE-2024-26458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26461&#34;&gt;CVE-2024-26461&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37370&#34;&gt;CVE-2024-37370&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37371&#34;&gt;CVE-2024-37371&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in krb5, the MIT implementation of the Kerberos network authentication protocol.&lt;/p&gt;
&lt;p&gt;CVE-2024-26458&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory leak in xmt_rmtcallres()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-26461&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory leak in gss_krb5int_make_seal_token_v3()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-37370&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GSS wrap token Extra Count field manipulation
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-37371&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Invalid GSS memory reads with manipulated tokens
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1140-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1140-1-imagemagick/</link>
      <pubDate>Fri, 26 Jul 2024 10:53:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1140-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1140-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u27 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11752&#34;&gt;CVE-2017-11752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12566&#34;&gt;CVE-2017-12566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18022&#34;&gt;CVE-2017-18022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11655&#34;&gt;CVE-2018-11655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3596&#34;&gt;CVE-2021-3596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28463&#34;&gt;CVE-2022-28463&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48541&#34;&gt;CVE-2022-48541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1289&#34;&gt;CVE-2023-1289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5341&#34;&gt;CVE-2023-5341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34151&#34;&gt;CVE-2023-34151&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Imagemagick, an image processing toolking was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2017-11752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The ReadMAGICKImage function allows remote attackers to cause
a denial of service (memory leak) via a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-12566&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak vulnerability was found in the function ReadMVGImage
in mvg coder, which allows attackers to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18022&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak vulnerability was found in MontageImageCommand.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-11655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak vulnerability was found in the function GetImagePixelCache
which allows attackers to cause a denial of service via a crafted
CALS image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3596&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference flaw was found in ReadSVGImage(). This issue
is due to not checking the return value from libxml2&#39;s xmlCreatePushParserCtxt()
and uses the value directly, which leads to a crash and segmentation fault.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28463&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow was found in Imagemagick in cin file coder.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48541&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak was found that allows a remote attackers to perform
a denial of service via the &amp;quot;identify -help&amp;quot; command.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1289&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Loading a specially created SVG file may cause a segmentation fault.
When ImageMagick crashes, it generates a lot of trash files. These trash
files can be large if the SVG file contains many render actions, and could
result in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5341&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap use-after-free flaw was found in coders/bmp.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34151&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Undefined behaviors of casting double to size_t in svg, mvg and other
coders.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1139-1 phppgadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1139-1-phppgadmin/</link>
      <pubDate>Thu, 25 Jul 2024 12:11:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1139-1-phppgadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1139-1-phppgadmin/">
      
&lt;p&gt;Package : phppgadmin&lt;/p&gt;


&lt;p&gt;Version : 5.1-1.1&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40619&#34;&gt;CVE-2023-40619&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential Remote Code Execution (RCE) vulnerability was discovered in
phppgadmin, a web-based administration tool for the PostgreSQL database.&lt;/p&gt;
&lt;p&gt;This was an issue related to the deserialisation of untrusted data, which may
have led to remote code execution because user-controlled data was passed
directly to the PHP &lt;code&gt;unserialize()&lt;/code&gt; function.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1133-2 imagemagick regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1133-2-imagemagick/</link>
      <pubDate>Tue, 23 Jul 2024 23:02:21 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1133-2-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1133-2-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u9 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34151&#34;&gt;CVE-2023-34151&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Imagemagick security update issued as ELA 1133-1 addressed the
vulnerability identified by CVE-2023-34151. The fix for that CVE introduced a
regression.&lt;/p&gt;
&lt;p&gt;A Magick Vector Graphics file including a pattern operator could return an
incorrect bounding box, and thus generate a corrupted pattern.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1138-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1138-1-python3.4/</link>
      <pubDate>Tue, 23 Jul 2024 16:21:43 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1138-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1138-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u18 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4032&#34;&gt;CVE-2024-4032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5642&#34;&gt;CVE-2024-5642&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the Python3 interpreter.&lt;/p&gt;
&lt;p&gt;CVE-2024-4032&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect information about private addresses in the ipaddress module
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-5642&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NPN buffer overread when using empty list in SSLContext.set_npn_protocols()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that the CVE-2024-5642 fix disables NPN (Next Protocol Negotiation) in the ssl module, NPN is a TLS extension for the obsolete SPDY protocol (HTTP/2 is the successor to SPDY).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1137-1 python3.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1137-1-python3.5/</link>
      <pubDate>Tue, 23 Jul 2024 16:05:19 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1137-1-python3.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1137-1-python3.5/">
      
&lt;p&gt;Package : python3.5&lt;/p&gt;


&lt;p&gt;Version : 3.5.3-1&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0397&#34;&gt;CVE-2024-0397&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4032&#34;&gt;CVE-2024-4032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5642&#34;&gt;CVE-2024-5642&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the Python3 interpreter.&lt;/p&gt;
&lt;p&gt;CVE-2024-0397&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Race condition in ssl.SSLContext
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-4032&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect information about private addresses in the ipaddress module
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-5642&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NPN buffer overread when using empty list in SSLContext.set_npn_protocols()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that the CVE-2024-5642 fix disables NPN (Next Protocol Negotiation) in the ssl module, NPN is a TLS extension for the obsolete SPDY protocol (HTTP/2 is the successor to SPDY). Support for the NPN-successor ALPN for HTTP/2 continues to be available.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1136-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1136-1-imagemagick/</link>
      <pubDate>Tue, 23 Jul 2024 12:30:47 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1136-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1136-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u20 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11752&#34;&gt;CVE-2017-11752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12566&#34;&gt;CVE-2017-12566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18022&#34;&gt;CVE-2017-18022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11655&#34;&gt;CVE-2018-11655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48541&#34;&gt;CVE-2022-48541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1289&#34;&gt;CVE-2023-1289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5341&#34;&gt;CVE-2023-5341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34151&#34;&gt;CVE-2023-34151&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Imagemagick, an image processing toolking was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2017-11752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The ReadMAGICKImage function allows remote attackers to cause
a denial of service (memory leak) via a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-12566&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak vulnerability was found in the function ReadMVGImage
in mvg coder, which allows attackers to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18022&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak vulnerability was found in MontageImageCommand.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-11655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak vulnerability was found in the function GetImagePixelCache
which allows attackers to cause a denial of service via a crafted
CALS image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48541&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak in was found that allows a remote attackers to perform
a denial of service via the &amp;quot;identify -help&amp;quot; command.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1289&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Loading a specially created SVG file may cause a segmentation fault.
When ImageMagick crashes, it generates a lot of trash files. These trash
files can be large if the SVG file contains many render actions, and could
result in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5341&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap use-after-free flaw was found in coders/bmp.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34151&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Undefined behaviors of casting double to size_t in svg, mvg and other
coders.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1135-1 python3.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1135-1-python3.7/</link>
      <pubDate>Mon, 22 Jul 2024 17:53:36 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1135-1-python3.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1135-1-python3.7/">
      
&lt;p&gt;Package : python3.7&lt;/p&gt;


&lt;p&gt;Version : 3.7.3-2&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0397&#34;&gt;CVE-2024-0397&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4032&#34;&gt;CVE-2024-4032&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the Python3 interpreter.&lt;/p&gt;
&lt;p&gt;CVE-2024-0397&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Race condition in ssl.SSLContext
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-4032&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect information about private addresses in the ipaddress module
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1134-1 uw-imap regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1134-1-uw-imap/</link>
      <pubDate>Sat, 20 Jul 2024 20:15:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1134-1-uw-imap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1134-1-uw-imap/">
      
&lt;p&gt;Package : uw-imap&lt;/p&gt;


&lt;p&gt;Version : 8:2007f~dfsg-6&amp;#43;deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;The uw-imap toolkit package had a problem when used with openssl 1.1.1.&lt;/p&gt;
&lt;p&gt;It could not work with Google IMAP servers because Google wants SNI requests if the client supports TLS 1.3.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1133-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1133-1-imagemagick/</link>
      <pubDate>Fri, 19 Jul 2024 21:01:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1133-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1133-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.9.10.23&amp;#43;dfsg-2.1&amp;#43;deb10u8 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1289&#34;&gt;CVE-2023-1289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34151&#34;&gt;CVE-2023-34151&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The security fixes for two security vulnerabilities in Imagemagick, an image
processing toolking, were found to be incomplete.&lt;/p&gt;
&lt;p&gt;CVE-2023-1289&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Loading a specially created SVG file may cause a segmentation fault.
When ImageMagick crashes, it generates a lot of trash files. These trash
files can be large if the SVG file contains many render actions, and could
result in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34151&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Undefined behaviors of casting double to size_t in svg, mvg and other
coders.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;These vulnerabilities were previously addressed in Debian 10 buster during
its Debian Long Term Support period, as announced via the [DLA 3737-1]:&lt;/p&gt;
&lt;p&gt;[DLA 3737-1] &lt;a href=&#34;https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html&#34;&gt;https://lists.debian.org/debian-lts-announce/2024/02/msg00007.html&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1132-1 php-horde-mime-viewer security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1132-1-php-horde-mime-viewer/</link>
      <pubDate>Wed, 17 Jul 2024 12:02:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1132-1-php-horde-mime-viewer/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1132-1-php-horde-mime-viewer/">
      
&lt;p&gt;Package : php-horde-mime-viewer&lt;/p&gt;


&lt;p&gt;Version : 2.0.7-2&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26874&#34;&gt;CVE-2022-26874&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A Cross-Site Scripting (XSS) vulnerability was discovered in
php-horde-mime-viewer, a PHP library for parsing and displaying email messages
encoded in the MIME (or &amp;ldquo;Multipurpose Internet Mail Extensions&amp;rdquo;) format.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1131-1 phpldapadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1131-1-phpldapadmin/</link>
      <pubDate>Tue, 16 Jul 2024 09:16:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1131-1-phpldapadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1131-1-phpldapadmin/">
      
&lt;p&gt;Package : phpldapadmin&lt;/p&gt;


&lt;p&gt;Version : 1.2.2-5.2&amp;#43;deb8u3 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-15039&#34;&gt;CVE-2016-15039&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A HTTP request smuggling vulnerability was discovered in &lt;code&gt;phpldapadmin&lt;/code&gt;, a
web-based interface for administering Lightweight Directory Access Protocol
(LDAP) servers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1130-1 binutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1130-1-binutils/</link>
      <pubDate>Mon, 15 Jul 2024 10:02:51 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1130-1-binutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1130-1-binutils/">
      
&lt;p&gt;Package : binutils&lt;/p&gt;


&lt;p&gt;Version : 2.25-5&amp;#43;deb8u2 (jessie), 2.28-5&amp;#43;deb9u1 (stretch), 2.31.1-16&amp;#43;deb10u1 (buster)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12934&#34;&gt;CVE-2018-12934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000876&#34;&gt;CVE-2018-1000876&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been fixed in binutils, the GNU assembler, linker and binary utilities.&lt;/p&gt;
&lt;p&gt;Note that the fix for CVE-2018-12934 removes demangling support for some ancient (e.g. GCC 2.x) mangling schemes&lt;/p&gt;
&lt;p&gt;CVE-2018-12934&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OOM in c++filt
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1000876&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer Overflow in objdump
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1129-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1129-1-apache2/</link>
      <pubDate>Thu, 11 Jul 2024 20:47:15 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1129-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1129-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.25-3&amp;#43;deb9u17 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-9490&#34;&gt;CVE-2020-9490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11993&#34;&gt;CVE-2020-11993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33193&#34;&gt;CVE-2021-33193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45802&#34;&gt;CVE-2023-45802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27316&#34;&gt;CVE-2024-27316&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in the HTTP2 module of apache2.&lt;/p&gt;
&lt;p&gt;CVE-2020-9490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A specially crafted value for the &#39;Cache-Digest&#39; header in a HTTP/2 request would resulted in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-11993&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33193&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted method sent through HTTP/2 bypassed validation and were forwarded by mod_proxy, which could lead to request splitting or cache poisoning.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45802&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request&#39;s memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-27316&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTTP/2 incoming headers exceeding the limit were temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client did not stop sending headers, this led to memory exhaustion.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1128-1 axis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1128-1-axis/</link>
      <pubDate>Thu, 11 Jul 2024 17:08:17 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1128-1-axis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1128-1-axis/">
      
&lt;p&gt;Package : axis&lt;/p&gt;


&lt;p&gt;Version : 1.4-21&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8032&#34;&gt;CVE-2018-8032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40743&#34;&gt;CVE-2023-40743&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in Apache Axis, an XML-based web service
framework for Java.&lt;/p&gt;
&lt;p&gt;CVE-2018-8032: Fix a cross-site scripting (XSS) attack in the default
servlet/services. (&lt;a href=&#34;https://bugs.debian.org/905328&#34;&gt;#905328&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;CVE-2023-40743: Fix an issue in &lt;code&gt;ServiceFactory.getService&lt;/code&gt; that allowed
potentially dangerous lookup mechanisms. When passing untrusted input to this
API method, this could have exposed the application to DoS, SSRF and even
attacks leading to remote code execution. (&lt;a href=&#34;https://bugs.debian.org/1051288&#34;&gt;#1051288&lt;/a&gt;)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1127-1 dns-root-data security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1127-1-dns-root-data/</link>
      <pubDate>Mon, 08 Jul 2024 13:00:27 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1127-1-dns-root-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1127-1-dns-root-data/">
      
&lt;p&gt;Package : dns-root-data&lt;/p&gt;


&lt;p&gt;Version : 2024041801~deb8u1 (jessie), 2024041801~deb9u1 (stretch), 2024041801~deb10u1 (buster)&lt;/p&gt;


      &lt;p&gt;The dns-root-data package contains various DNS root zone related data as
published by IANA to be used by various DNS software as a common source of DNS
root zone data. This release includes updates such as the new A and AAAA
records of the B root server. Without this update, users could face slowdowns
when doing DNS queries after the old B root server&amp;rsquo;s IP addresses cease
functioning, on November 27th 2024.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1126-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1126-1-exim4/</link>
      <pubDate>Sun, 07 Jul 2024 18:36:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1126-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1126-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.84.2-2&amp;#43;deb8u12 (jessie), 4.89-2&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51766&#34;&gt;CVE-2023-51766&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Exim, a mail transport agent, can be induced to accept a
second message embedded as part of the body of a first message in certain
configurations where PIPELINING or CHUNKING on incoming connections is offered.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1125-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1125-1-ffmpeg/</link>
      <pubDate>Sat, 06 Jul 2024 23:34:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1125-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1125-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48434&#34;&gt;CVE-2022-48434&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50010&#34;&gt;CVE-2023-50010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51793&#34;&gt;CVE-2023-51793&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51794&#34;&gt;CVE-2023-51794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51798&#34;&gt;CVE-2023-51798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31578&#34;&gt;CVE-2024-31578&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several buffer overflow vulnerabilities were discovered in ffmpeg, tools for
transcoding, streaming and playing of multimedia files. An attacker may use
these flaws to create specially crafted multimedia files and cause a denial of
service or arbitrary code execution when they are processed by ffmpeg.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1124-1 sendmail security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1124-1-sendmail/</link>
      <pubDate>Fri, 05 Jul 2024 20:34:20 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1124-1-sendmail/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1124-1-sendmail/">
      
&lt;p&gt;Package : sendmail&lt;/p&gt;


&lt;p&gt;Version : 8.15.2-8&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51765&#34;&gt;CVE-2023-51765&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;sendmail allowed SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation technique to inject e-mail
messages with a spoofed MAIL FROM address, allowing bypass
of an SPF protection mechanism. This occurs because sendmail supports
&lt;LF&gt;.&lt;CR&gt;&lt;LF&gt; but some other popular e-mail servers do not.&lt;/p&gt;
&lt;p&gt;This particular injection vulnerability has been closed,
unfortunatly full closure need to reject mail that
contain NUL (0x00 byte).&lt;/p&gt;
&lt;p&gt;This is slighly non conformant with RFC and could
be opt-out by setting confREJECT_NUL to &amp;lsquo;false&amp;rsquo;
in sendmail.mc file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1122-1 emacs24 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1122-1-emacs24/</link>
      <pubDate>Fri, 05 Jul 2024 10:00:21 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1122-1-emacs24/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1122-1-emacs24/">
      
&lt;p&gt;Package : emacs24&lt;/p&gt;


&lt;p&gt;Version : 24.4&amp;#43;1-5&amp;#43;deb8u5 (jessie), 24.5&amp;#43;1-11&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39331&#34;&gt;CVE-2024-39331&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in GNU Emacs, the extensible, customisable,
self-documenting display editor.&lt;/p&gt;
&lt;p&gt;The org-link-expand-abbrev function expanded a %(&amp;hellip;) link abbrev even when
the abbrev specified an unsafe function, such as shell-command-to-string.
This could lead to arbitrary code execution as soon as an Org-mode format file
was opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1123-1 emacs25 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1123-1-emacs25/</link>
      <pubDate>Fri, 05 Jul 2024 10:00:21 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1123-1-emacs25/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1123-1-emacs25/">
      
&lt;p&gt;Package : emacs25&lt;/p&gt;


&lt;p&gt;Version : 25.1&amp;#43;1-4&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39331&#34;&gt;CVE-2024-39331&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in GNU Emacs, the extensible, customisable,
self-documenting display editor.&lt;/p&gt;
&lt;p&gt;The org-link-expand-abbrev function expanded a %(&amp;hellip;) link abbrev even when
the abbrev specified an unsafe function, such as shell-command-to-string.
This could lead to arbitrary code execution as soon as an Org-mode format file
was opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1121-1 python-idna security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1121-1-python-idna/</link>
      <pubDate>Wed, 03 Jul 2024 12:09:46 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1121-1-python-idna/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1121-1-python-idna/">
      
&lt;p&gt;Package : python-idna&lt;/p&gt;


&lt;p&gt;Version : 2.2-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3651&#34;&gt;CVE-2024-3651&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Guido Vranken discovered an issue in python3-idna, a library to support
the Internationalized Domain Names in Applications (IDNA) protocol.  A
specially crafted argument to the idna.encode() function could consume
significant resources, which may lead to Denial of Service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1120-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1120-1-linux-5.10/</link>
      <pubDate>Tue, 02 Jul 2024 10:37:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1120-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1120-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.218-1~deb8u1 (jessie), 5.10.218-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48655&#34;&gt;CVE-2022-48655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52585&#34;&gt;CVE-2023-52585&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52882&#34;&gt;CVE-2023-52882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26900&#34;&gt;CVE-2024-26900&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27398&#34;&gt;CVE-2024-27398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27399&#34;&gt;CVE-2024-27399&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27401&#34;&gt;CVE-2024-27401&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35848&#34;&gt;CVE-2024-35848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35947&#34;&gt;CVE-2024-35947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36017&#34;&gt;CVE-2024-36017&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36031&#34;&gt;CVE-2024-36031&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36883&#34;&gt;CVE-2024-36883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36886&#34;&gt;CVE-2024-36886&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36889&#34;&gt;CVE-2024-36889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36902&#34;&gt;CVE-2024-36902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36904&#34;&gt;CVE-2024-36904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36905&#34;&gt;CVE-2024-36905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36916&#34;&gt;CVE-2024-36916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36919&#34;&gt;CVE-2024-36919&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36929&#34;&gt;CVE-2024-36929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36933&#34;&gt;CVE-2024-36933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36934&#34;&gt;CVE-2024-36934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36939&#34;&gt;CVE-2024-36939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36940&#34;&gt;CVE-2024-36940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36941&#34;&gt;CVE-2024-36941&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36946&#34;&gt;CVE-2024-36946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36950&#34;&gt;CVE-2024-36950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36953&#34;&gt;CVE-2024-36953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36954&#34;&gt;CVE-2024-36954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36957&#34;&gt;CVE-2024-36957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36959&#34;&gt;CVE-2024-36959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36960&#34;&gt;CVE-2024-36960&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1119-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1119-1-glibc/</link>
      <pubDate>Sun, 30 Jun 2024 23:53:41 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1119-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1119-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.19-18&amp;#43;deb8u14 (jessie), 2.24-11&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33599&#34;&gt;CVE-2024-33599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33600&#34;&gt;CVE-2024-33600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33601&#34;&gt;CVE-2024-33601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33602&#34;&gt;CVE-2024-33602&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the Name Service Cache Daemon
that is built by the GNU C library and shipped in the nscd binary package.&lt;/p&gt;
&lt;p&gt;CVE-2024-33599&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;nscd: Stack-based buffer overflow in netgroup cache
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-33600&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;nscd: Null pointer crashes after notfound response
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-33601&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;nscd: Daemon may terminate on memory allocation failure
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-33602&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;nscd: Possible memory corruption
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1118-1 dcmtk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1118-1-dcmtk/</link>
      <pubDate>Sun, 30 Jun 2024 23:51:53 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1118-1-dcmtk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1118-1-dcmtk/">
      
&lt;p&gt;Package : dcmtk&lt;/p&gt;


&lt;p&gt;Version : 3.6.1~20160216-4&amp;#43;deb10u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1010228&#34;&gt;CVE-2019-1010228&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41687&#34;&gt;CVE-2021-41687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41688&#34;&gt;CVE-2021-41688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41689&#34;&gt;CVE-2021-41689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41690&#34;&gt;CVE-2021-41690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2121&#34;&gt;CVE-2022-2121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43272&#34;&gt;CVE-2022-43272&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28130&#34;&gt;CVE-2024-28130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34508&#34;&gt;CVE-2024-34508&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34509&#34;&gt;CVE-2024-34509&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in DCMTK, a collection of
libraries and applications implementing large parts the DICOM standard
for medical images.&lt;/p&gt;
&lt;p&gt;CVE-2019-1010228&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in DcmRLEDecoder::decompress()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41687&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect freeing of memory
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41688&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect freeing of memory
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41689&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41690&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect freeing of memory
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2121&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43272&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory leak in single process mode
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-28130&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Segmentation faults due to incorrect typecast
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-34508&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Segmentation fault via invalid DIMSE message
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-34509&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Segmentation fault via invalid DIMSE message
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1117-1 gunicorn security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1117-1-gunicorn/</link>
      <pubDate>Sat, 29 Jun 2024 11:42:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1117-1-gunicorn/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1117-1-gunicorn/">
      
&lt;p&gt;Package : gunicorn&lt;/p&gt;


&lt;p&gt;Version : 19.6.0-10&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1135&#34;&gt;CVE-2024-1135&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Gunicorn, an event-based HTTP/WSGI server, fails to properly validate
Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS)
vulnerabilities. By crafting requests with conflicting Transfer-Encoding
headers, attackers can bypass security restrictions and access restricted
endpoints. This issue is due to Gunicorn&amp;rsquo;s handling of Transfer-Encoding
headers, where it incorrectly processes requests with multiple, conflicting
Transfer-Encoding headers, treating them as chunked regardless of the final
encoding specified. This vulnerability allows for a range of attacks including
cache poisoning, session manipulation, and data exposure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1116-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1116-1-linux-4.19/</link>
      <pubDate>Fri, 28 Jun 2024 14:27:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1116-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1116-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.316-1~deb8u1 (jessie), 4.19.316-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33630&#34;&gt;CVE-2021-33630&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48627&#34;&gt;CVE-2022-48627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0386&#34;&gt;CVE-2023-0386&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6040&#34;&gt;CVE-2023-6040&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6270&#34;&gt;CVE-2023-6270&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-7042&#34;&gt;CVE-2023-7042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46838&#34;&gt;CVE-2023-46838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47233&#34;&gt;CVE-2023-47233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52340&#34;&gt;CVE-2023-52340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52429&#34;&gt;CVE-2023-52429&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52436&#34;&gt;CVE-2023-52436&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52439&#34;&gt;CVE-2023-52439&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52443&#34;&gt;CVE-2023-52443&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52444&#34;&gt;CVE-2023-52444&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52445&#34;&gt;CVE-2023-52445&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52449&#34;&gt;CVE-2023-52449&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52464&#34;&gt;CVE-2023-52464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52469&#34;&gt;CVE-2023-52469&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52470&#34;&gt;CVE-2023-52470&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52486&#34;&gt;CVE-2023-52486&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52583&#34;&gt;CVE-2023-52583&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52587&#34;&gt;CVE-2023-52587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52594&#34;&gt;CVE-2023-52594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52599&#34;&gt;CVE-2023-52599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52600&#34;&gt;CVE-2023-52600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52601&#34;&gt;CVE-2023-52601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52602&#34;&gt;CVE-2023-52602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52603&#34;&gt;CVE-2023-52603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52604&#34;&gt;CVE-2023-52604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52609&#34;&gt;CVE-2023-52609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52612&#34;&gt;CVE-2023-52612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52615&#34;&gt;CVE-2023-52615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52619&#34;&gt;CVE-2023-52619&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52620&#34;&gt;CVE-2023-52620&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52622&#34;&gt;CVE-2023-52622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52623&#34;&gt;CVE-2023-52623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52628&#34;&gt;CVE-2023-52628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52644&#34;&gt;CVE-2023-52644&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52650&#34;&gt;CVE-2023-52650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52670&#34;&gt;CVE-2023-52670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52679&#34;&gt;CVE-2023-52679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52683&#34;&gt;CVE-2023-52683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52691&#34;&gt;CVE-2023-52691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52693&#34;&gt;CVE-2023-52693&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52698&#34;&gt;CVE-2023-52698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52699&#34;&gt;CVE-2023-52699&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52880&#34;&gt;CVE-2023-52880&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0340&#34;&gt;CVE-2024-0340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0607&#34;&gt;CVE-2024-0607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1086&#34;&gt;CVE-2024-1086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22099&#34;&gt;CVE-2024-22099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23849&#34;&gt;CVE-2024-23849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23851&#34;&gt;CVE-2024-23851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24857&#34;&gt;CVE-2024-24857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24858&#34;&gt;CVE-2024-24858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24861&#34;&gt;CVE-2024-24861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-25739&#34;&gt;CVE-2024-25739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26597&#34;&gt;CVE-2024-26597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26600&#34;&gt;CVE-2024-26600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26602&#34;&gt;CVE-2024-26602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26606&#34;&gt;CVE-2024-26606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26615&#34;&gt;CVE-2024-26615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26625&#34;&gt;CVE-2024-26625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26633&#34;&gt;CVE-2024-26633&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26635&#34;&gt;CVE-2024-26635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26636&#34;&gt;CVE-2024-26636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26642&#34;&gt;CVE-2024-26642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26645&#34;&gt;CVE-2024-26645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26651&#34;&gt;CVE-2024-26651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26663&#34;&gt;CVE-2024-26663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26664&#34;&gt;CVE-2024-26664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26671&#34;&gt;CVE-2024-26671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26675&#34;&gt;CVE-2024-26675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26679&#34;&gt;CVE-2024-26679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26685&#34;&gt;CVE-2024-26685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26696&#34;&gt;CVE-2024-26696&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26697&#34;&gt;CVE-2024-26697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26704&#34;&gt;CVE-2024-26704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26720&#34;&gt;CVE-2024-26720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26722&#34;&gt;CVE-2024-26722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26735&#34;&gt;CVE-2024-26735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26744&#34;&gt;CVE-2024-26744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26752&#34;&gt;CVE-2024-26752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26754&#34;&gt;CVE-2024-26754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26763&#34;&gt;CVE-2024-26763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26764&#34;&gt;CVE-2024-26764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26766&#34;&gt;CVE-2024-26766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26772&#34;&gt;CVE-2024-26772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26773&#34;&gt;CVE-2024-26773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26777&#34;&gt;CVE-2024-26777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26778&#34;&gt;CVE-2024-26778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26779&#34;&gt;CVE-2024-26779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26791&#34;&gt;CVE-2024-26791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26793&#34;&gt;CVE-2024-26793&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26801&#34;&gt;CVE-2024-26801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26805&#34;&gt;CVE-2024-26805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26816&#34;&gt;CVE-2024-26816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26817&#34;&gt;CVE-2024-26817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26820&#34;&gt;CVE-2024-26820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26825&#34;&gt;CVE-2024-26825&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26839&#34;&gt;CVE-2024-26839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26840&#34;&gt;CVE-2024-26840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26845&#34;&gt;CVE-2024-26845&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26851&#34;&gt;CVE-2024-26851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26852&#34;&gt;CVE-2024-26852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26857&#34;&gt;CVE-2024-26857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26859&#34;&gt;CVE-2024-26859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26863&#34;&gt;CVE-2024-26863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26874&#34;&gt;CVE-2024-26874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26875&#34;&gt;CVE-2024-26875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26878&#34;&gt;CVE-2024-26878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26880&#34;&gt;CVE-2024-26880&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26883&#34;&gt;CVE-2024-26883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26884&#34;&gt;CVE-2024-26884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26889&#34;&gt;CVE-2024-26889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26894&#34;&gt;CVE-2024-26894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26898&#34;&gt;CVE-2024-26898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26901&#34;&gt;CVE-2024-26901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26903&#34;&gt;CVE-2024-26903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26917&#34;&gt;CVE-2024-26917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26922&#34;&gt;CVE-2024-26922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26923&#34;&gt;CVE-2024-26923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26931&#34;&gt;CVE-2024-26931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26934&#34;&gt;CVE-2024-26934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26955&#34;&gt;CVE-2024-26955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26956&#34;&gt;CVE-2024-26956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26965&#34;&gt;CVE-2024-26965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26966&#34;&gt;CVE-2024-26966&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26969&#34;&gt;CVE-2024-26969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26973&#34;&gt;CVE-2024-26973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26974&#34;&gt;CVE-2024-26974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26976&#34;&gt;CVE-2024-26976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26981&#34;&gt;CVE-2024-26981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26984&#34;&gt;CVE-2024-26984&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26993&#34;&gt;CVE-2024-26993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26994&#34;&gt;CVE-2024-26994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26997&#34;&gt;CVE-2024-26997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27001&#34;&gt;CVE-2024-27001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27008&#34;&gt;CVE-2024-27008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27013&#34;&gt;CVE-2024-27013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27020&#34;&gt;CVE-2024-27020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27024&#34;&gt;CVE-2024-27024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27028&#34;&gt;CVE-2024-27028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27043&#34;&gt;CVE-2024-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27046&#34;&gt;CVE-2024-27046&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27059&#34;&gt;CVE-2024-27059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27074&#34;&gt;CVE-2024-27074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27075&#34;&gt;CVE-2024-27075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27077&#34;&gt;CVE-2024-27077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27078&#34;&gt;CVE-2024-27078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27388&#34;&gt;CVE-2024-27388&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27395&#34;&gt;CVE-2024-27395&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27396&#34;&gt;CVE-2024-27396&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27398&#34;&gt;CVE-2024-27398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27399&#34;&gt;CVE-2024-27399&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27401&#34;&gt;CVE-2024-27401&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27405&#34;&gt;CVE-2024-27405&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27410&#34;&gt;CVE-2024-27410&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27412&#34;&gt;CVE-2024-27412&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27413&#34;&gt;CVE-2024-27413&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27416&#34;&gt;CVE-2024-27416&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27419&#34;&gt;CVE-2024-27419&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27436&#34;&gt;CVE-2024-27436&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31076&#34;&gt;CVE-2024-31076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-33621&#34;&gt;CVE-2024-33621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35789&#34;&gt;CVE-2024-35789&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35806&#34;&gt;CVE-2024-35806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35807&#34;&gt;CVE-2024-35807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35809&#34;&gt;CVE-2024-35809&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35811&#34;&gt;CVE-2024-35811&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35815&#34;&gt;CVE-2024-35815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35819&#34;&gt;CVE-2024-35819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35821&#34;&gt;CVE-2024-35821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35822&#34;&gt;CVE-2024-35822&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35823&#34;&gt;CVE-2024-35823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35825&#34;&gt;CVE-2024-35825&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35828&#34;&gt;CVE-2024-35828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35830&#34;&gt;CVE-2024-35830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35835&#34;&gt;CVE-2024-35835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35847&#34;&gt;CVE-2024-35847&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35849&#34;&gt;CVE-2024-35849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35877&#34;&gt;CVE-2024-35877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35886&#34;&gt;CVE-2024-35886&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35888&#34;&gt;CVE-2024-35888&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35893&#34;&gt;CVE-2024-35893&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35898&#34;&gt;CVE-2024-35898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35902&#34;&gt;CVE-2024-35902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35910&#34;&gt;CVE-2024-35910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35915&#34;&gt;CVE-2024-35915&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35922&#34;&gt;CVE-2024-35922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35925&#34;&gt;CVE-2024-35925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35930&#34;&gt;CVE-2024-35930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35933&#34;&gt;CVE-2024-35933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35935&#34;&gt;CVE-2024-35935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35936&#34;&gt;CVE-2024-35936&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35944&#34;&gt;CVE-2024-35944&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35947&#34;&gt;CVE-2024-35947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35955&#34;&gt;CVE-2024-35955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35960&#34;&gt;CVE-2024-35960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35969&#34;&gt;CVE-2024-35969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35973&#34;&gt;CVE-2024-35973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35978&#34;&gt;CVE-2024-35978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35982&#34;&gt;CVE-2024-35982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35984&#34;&gt;CVE-2024-35984&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35997&#34;&gt;CVE-2024-35997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36004&#34;&gt;CVE-2024-36004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36014&#34;&gt;CVE-2024-36014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36015&#34;&gt;CVE-2024-36015&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36016&#34;&gt;CVE-2024-36016&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36017&#34;&gt;CVE-2024-36017&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36020&#34;&gt;CVE-2024-36020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36286&#34;&gt;CVE-2024-36286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36288&#34;&gt;CVE-2024-36288&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36883&#34;&gt;CVE-2024-36883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36886&#34;&gt;CVE-2024-36886&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36902&#34;&gt;CVE-2024-36902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36904&#34;&gt;CVE-2024-36904&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36905&#34;&gt;CVE-2024-36905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36919&#34;&gt;CVE-2024-36919&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36933&#34;&gt;CVE-2024-36933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36934&#34;&gt;CVE-2024-36934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36940&#34;&gt;CVE-2024-36940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36941&#34;&gt;CVE-2024-36941&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36946&#34;&gt;CVE-2024-36946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36950&#34;&gt;CVE-2024-36950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36954&#34;&gt;CVE-2024-36954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36959&#34;&gt;CVE-2024-36959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36960&#34;&gt;CVE-2024-36960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36964&#34;&gt;CVE-2024-36964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36971&#34;&gt;CVE-2024-36971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37353&#34;&gt;CVE-2024-37353&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-37356&#34;&gt;CVE-2024-37356&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38381&#34;&gt;CVE-2024-38381&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38549&#34;&gt;CVE-2024-38549&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38552&#34;&gt;CVE-2024-38552&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38558&#34;&gt;CVE-2024-38558&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38559&#34;&gt;CVE-2024-38559&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38560&#34;&gt;CVE-2024-38560&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38565&#34;&gt;CVE-2024-38565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38567&#34;&gt;CVE-2024-38567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38578&#34;&gt;CVE-2024-38578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38579&#34;&gt;CVE-2024-38579&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38582&#34;&gt;CVE-2024-38582&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38583&#34;&gt;CVE-2024-38583&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38587&#34;&gt;CVE-2024-38587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38589&#34;&gt;CVE-2024-38589&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38596&#34;&gt;CVE-2024-38596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38598&#34;&gt;CVE-2024-38598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38599&#34;&gt;CVE-2024-38599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38601&#34;&gt;CVE-2024-38601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38612&#34;&gt;CVE-2024-38612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38618&#34;&gt;CVE-2024-38618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38621&#34;&gt;CVE-2024-38621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38627&#34;&gt;CVE-2024-38627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38633&#34;&gt;CVE-2024-38633&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38634&#34;&gt;CVE-2024-38634&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38637&#34;&gt;CVE-2024-38637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38659&#34;&gt;CVE-2024-38659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-38780&#34;&gt;CVE-2024-38780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-39292&#34;&gt;CVE-2024-39292&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;This is the final Linux 4.19 kernel update, which becomes end-of-life.
It is advised to upgrade to a supported kernel, see the
&lt;a href=&#34;https://www.freexian.com/lts/extended/docs/kernel-backport/&#34;&gt;kernel page&lt;/a&gt;
for details.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1115-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1115-1-glib2.0/</link>
      <pubDate>Thu, 27 Jun 2024 11:16:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1115-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1115-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.50.3-2&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-34397&#34;&gt;CVE-2024-34397&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Alicia Boya Garcia reported that the GDBus signal subscriptions in the
GLib library are prone to a spoofing vulnerability. A local attacker can
take advantage of this flaw to cause a GDBus-based client to behave
incorrectly, with an application-dependent impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1114-1 composer security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1114-1-composer/</link>
      <pubDate>Wed, 19 Jun 2024 12:25:28 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1114-1-composer/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1114-1-composer/">
      
&lt;p&gt;Package : composer&lt;/p&gt;


&lt;p&gt;Version : 1.2.2-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35241&#34;&gt;CVE-2024-35241&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-35242&#34;&gt;CVE-2024-35242&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were a number of command-line injection
vulnerabilities in Composer, a popular dependency manager for PHP.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;install&lt;/code&gt;, &lt;code&gt;status&lt;/code&gt;, &lt;code&gt;reinstall&lt;/code&gt; and &lt;code&gt;remove&lt;/code&gt; functionality had issues when
used with Git or Hg repositories which used maliciously- crafted branch names,
which could have been abused to execute arbitrary shell commands.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1113-1 libndp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1113-1-libndp/</link>
      <pubDate>Wed, 19 Jun 2024 11:44:30 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1113-1-libndp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1113-1-libndp/">
      
&lt;p&gt;Package : libndp&lt;/p&gt;


&lt;p&gt;Version : 1.4-2&amp;#43;deb8u2 (jessie), 1.6-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5564&#34;&gt;CVE-2024-5564&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a buffer overflow vulnerability in &lt;code&gt;libndp&lt;/code&gt;, a
library for implementing IPv6&amp;rsquo;s &amp;ldquo;Neighbor Discovery Protocol&amp;rdquo; (NDP) and is used
by Network Manager and other networking tools.&lt;/p&gt;
&lt;p&gt;A local, malicious user could have caused a buffer overflow in Network Manager
by sending a malformed IPv6 router advertisement packet. This issue existed
because &lt;code&gt;libndp&lt;/code&gt; was not correctly validating route length information.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1107-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1107-1-php7.0/</link>
      <pubDate>Tue, 18 Jun 2024 22:43:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1107-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1107-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5458&#34;&gt;CVE-2024-5458&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PHP, a widely-used open source general purpose scripting language, is affected
by a security problem when parsing certain types of URLs.&lt;/p&gt;
&lt;p&gt;Due to a code logic error filtering functions such as filter_var when
validating URLs (FILTER_VALIDATE_URL) will result in invalid user information
(username + password part of URLs) being treated as valid user information.
This may lead to the downstream code accepting invalid URLs as valid and
parsing them incorrectly. The problem is related to CVE-2020-7071 but affects
IPv6 host parts.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1108-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1108-1-php5/</link>
      <pubDate>Tue, 18 Jun 2024 22:43:47 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1108-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1108-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u20 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5458&#34;&gt;CVE-2024-5458&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PHP, a widely-used open source general purpose scripting language, is affected
by a security problem when parsing certain types of URLs.&lt;/p&gt;
&lt;p&gt;Due to a code logic error filtering functions such as filter_var when
validating URLs (FILTER_VALIDATE_URL) will result in invalid user information
(username + password part of URLs) being treated as valid user information.
This may lead to the downstream code accepting invalid URLs as valid and
parsing them incorrectly. The problem is related to CVE-2020-7071 but affects
IPv6 host parts.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1110-1 netty security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1110-1-netty/</link>
      <pubDate>Tue, 18 Jun 2024 22:43:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1110-1-netty/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1110-1-netty/">
      
&lt;p&gt;Package : netty&lt;/p&gt;


&lt;p&gt;Version : 1:4.1.7-2&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-29025&#34;&gt;CVE-2024-29025&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Julien Viet discovered that Netty, a Java NIO client/server socket framework,
was vulnerable to allocation of resources without limits or throttling due to
the accumulation of data in the HttpPostRequestDecoder. This would allow an
attacker to cause a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1112-1 libvpx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1112-1-libvpx/</link>
      <pubDate>Tue, 18 Jun 2024 23:39:23 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1112-1-libvpx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1112-1-libvpx/">
      
&lt;p&gt;Package : libvpx&lt;/p&gt;


&lt;p&gt;Version : 1.3.0-3&amp;#43;deb8u5 (jessie), 1.6.1-3&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-6711&#34;&gt;CVE-2016-6711&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-0393&#34;&gt;CVE-2017-0393&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5197&#34;&gt;CVE-2024-5197&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in libvpx, a library for decoding and encoding VP8 and VP9 videos.&lt;/p&gt;
&lt;p&gt;CVE-2016-6711 (vulnerability was not present in stretch)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;VP8 decoder crash with invalid leading keyframes
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-0393 (vulnerability was not present in stretch)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;VP8 threading issues
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-5197&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflows
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1111-1 pymongo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1111-1-pymongo/</link>
      <pubDate>Mon, 17 Jun 2024 19:36:53 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1111-1-pymongo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1111-1-pymongo/">
      
&lt;p&gt;Package : pymongo&lt;/p&gt;


&lt;p&gt;Version : 2.7.2-1&amp;#43;deb8u1 (jessie), 3.4.0-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5629&#34;&gt;CVE-2024-5629&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out-of-bounds read in the &amp;lsquo;bson&amp;rsquo; module of PyMongo allowed deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1109-1 nano security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1109-1-nano/</link>
      <pubDate>Mon, 17 Jun 2024 14:58:58 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1109-1-nano/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1109-1-nano/">
      
&lt;p&gt;Package : nano&lt;/p&gt;


&lt;p&gt;Version : 2.2.6-3&amp;#43;deb8u1 (jessie), 2.7.4-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-5742&#34;&gt;CVE-2024-5742&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A symlink attack with emergency file saving has been fixed in the text
editor nano.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1106-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1106-1-apache2/</link>
      <pubDate>Fri, 14 Jun 2024 19:38:36 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1106-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1106-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u27 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38709&#34;&gt;CVE-2023-38709&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Faulty input validation in the core of Apache allowed malicious or exploitable backend/content generators to split HTTP responses&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1105-1 gst-plugins-base0.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1105-1-gst-plugins-base0.10/</link>
      <pubDate>Thu, 06 Jun 2024 09:51:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1105-1-gst-plugins-base0.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1105-1-gst-plugins-base0.10/">
      
&lt;p&gt;Package : gst-plugins-base0.10&lt;/p&gt;


&lt;p&gt;Version : 0.10.36-2&amp;#43;deb8u4 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4453&#34;&gt;CVE-2024-4453&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow in the EXIF metadata parsing was discovered in the
GStreamer media framework, which may result in denial of service or
potentially the execution of arbitrary code if a malformed file is
processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1104-1 nghttp2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1104-1-nghttp2/</link>
      <pubDate>Sat, 01 Jun 2024 01:02:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1104-1-nghttp2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1104-1-nghttp2/">
      
&lt;p&gt;Package : nghttp2&lt;/p&gt;


&lt;p&gt;Version : 1.18.1-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28182&#34;&gt;CVE-2024-28182&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in nghttp2, a library, server, proxy and client implementing HTTP/2.
An implementation using the nghttp2 library will continue to receive CONTINUATION frames,
and will not callback to the application to allow visibility into this information before
it resets the stream, resulting in Denial of Service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1103-1 inetutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1103-1-inetutils/</link>
      <pubDate>Fri, 31 May 2024 17:45:03 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1103-1-inetutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1103-1-inetutils/">
      
&lt;p&gt;Package : inetutils&lt;/p&gt;


&lt;p&gt;Version : 2:1.9.4-2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0053&#34;&gt;CVE-2019-0053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40303&#34;&gt;CVE-2023-40303&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were fixed in inetutils,
the GNU network utilities.&lt;/p&gt;
&lt;p&gt;CVE-2019-0053&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient validation of environment variables in telnet
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-40303&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Possible privilege escalation in ftpd, rcp, rlogin, rsh, rshd, and uucpd when a set*id() family function like setuid() fails
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1102-1 gst-plugins-base1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1102-1-gst-plugins-base1.0/</link>
      <pubDate>Thu, 30 May 2024 23:57:46 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1102-1-gst-plugins-base1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1102-1-gst-plugins-base1.0/">
      
&lt;p&gt;Package : gst-plugins-base1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u5 (jessie), 1.10.4-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-4453&#34;&gt;CVE-2024-4453&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow in the EXIF metadata parser has been fixed in the
GStreamer media framework.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1101-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1101-1-python-django/</link>
      <pubDate>Wed, 29 May 2024 09:58:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1101-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1101-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u22 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36053&#34;&gt;CVE-2023-36053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43665&#34;&gt;CVE-2023-43665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24680&#34;&gt;CVE-2024-24680&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Three vulnerabilities were fixed in &lt;code&gt;python-django&lt;/code&gt;, a popular Python-based web
development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-36053: Prevent a potential regular expression denial of service
(DoS) vulnerability in &lt;code&gt;EmailValidator&lt;/code&gt; and &lt;code&gt;URLValidator&lt;/code&gt;. &lt;code&gt;EmailValidator&lt;/code&gt;
and &lt;code&gt;URLValidator&lt;/code&gt; were subject to potential regular expression denial of
service attack via a very large number of domain name labels of emails and
URLs.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-43665: Fix a DoS vulnerability in &lt;code&gt;django.utils.text.Truncator&lt;/code&gt;.
Following the fix for CVE-2019-14232, the regular expressions used in the
implementation of &lt;code&gt;django.utils.text.Truncator&lt;/code&gt;’s &lt;code&gt;chars&lt;/code&gt;() and &lt;code&gt;words&lt;/code&gt;()
methods were revised and improved. However, these regular expressions still
exhibited linear backtracking complexity, so when given a very long,
potentially malformed HTML input, the evaluation would still be slow, leading
to a potential denial of service vulnerability.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2024-24680: Prevent a potential DoS in the &lt;code&gt;intcomma&lt;/code&gt; template filter.
The &lt;code&gt;intcomma&lt;/code&gt; template filter was subject to a potential denial-of-service
attack when used with very long strings.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1100-1 python-pymysql security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1100-1-python-pymysql/</link>
      <pubDate>Mon, 27 May 2024 23:39:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1100-1-python-pymysql/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1100-1-python-pymysql/">
      
&lt;p&gt;Package : python-pymysql&lt;/p&gt;


&lt;p&gt;Version : 0.7.10-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-36039&#34;&gt;CVE-2024-36039&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential SQL injection attack in
&lt;code&gt;python-pymysql&lt;/code&gt;, a MySQL client library for Python. This was exploitable when
&lt;code&gt;python-pymysql&lt;/code&gt; was used with untrusted JSON input as keys were not escaped by
the &lt;code&gt;escape_dict&lt;/code&gt; routine.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1099-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1099-1-apache2/</link>
      <pubDate>Sun, 26 May 2024 19:52:51 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1099-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1099-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u26 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31122&#34;&gt;CVE-2023-31122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24795&#34;&gt;CVE-2024-24795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2023-31122&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out-of-bounds Read vulnerability was found in mod_macro of Apache HTTP Server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-24795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Please note that the fix of CVE-2024-24795, may break unrelated CGI-BIN scripts. As part of the security fix, the Apache webserver
mod_cgi module has stopped relaying the Content-Length field of the HTTP reply header from the CGI programs back to the client in cases where the connection is to be closed and the client
is able to read until end-of-file. You may restore legacy behavior for trusted scripts by adding the following configuration environment variable to the
Apache configuration, scoped to the &lt;code&gt;&amp;lt;Directory&amp;gt;&lt;/code&gt; entry or entries in which script is being served via CGI,
&lt;code&gt;SetEnv ap_trust_cgilike_cl &amp;quot;yes&amp;quot;&lt;/code&gt;.
The definitive fix is to read the whole input, re-allocating the input buffer to fit as more input is received,
and to not trust that CONTENT_LENGTH variable is always present.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1098-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1098-1-apache2/</link>
      <pubDate>Sun, 26 May 2024 19:13:52 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1098-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1098-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.25-3&amp;#43;deb9u16 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31122&#34;&gt;CVE-2023-31122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38709&#34;&gt;CVE-2023-38709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24795&#34;&gt;CVE-2024-24795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2023-31122&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Out-of-bounds Read vulnerability was found in mod_macro of Apache HTTP Server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38709&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-24795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Please note that the fix of CVE-2024-24795, may break unrelated CGI-BIN scripts. As part of the security fix, the Apache webserver
mod_cgi module has stopped relaying the Content-Length field of the HTTP reply header from the CGI programs back to the client in cases where the connection is to be closed and the client
is able to read until end-of-file. You may restore legacy behavior for trusted scripts by adding the following configuration environment variable to the
Apache configuration, scoped to the &lt;code&gt;&amp;lt;Directory&amp;gt;&lt;/code&gt; entry or entries in which script is being served via CGI,
&lt;code&gt;SetEnv ap_trust_cgilike_cl &amp;quot;yes&amp;quot;&lt;/code&gt;.
The definitive fix is to read the whole input, re-allocating the input buffer to fit as more input is received,
and to not trust that CONTENT_LENGTH variable is always present.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1097-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1097-1-libreoffice/</link>
      <pubDate>Sun, 26 May 2024 13:56:58 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1097-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1097-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3~deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3044&#34;&gt;CVE-2024-3044&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1086-2 emacs25 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1086-2-emacs25/</link>
      <pubDate>Sat, 25 May 2024 09:31:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1086-2-emacs25/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1086-2-emacs25/">
      
&lt;p&gt;Package : emacs25&lt;/p&gt;


&lt;p&gt;Version : 25.1&amp;#43;1-4&amp;#43;deb9u4 (stretch)&lt;/p&gt;


      &lt;p&gt;The previous update to Emacs did not include builds for all supported
architectures.  The same update has been reissued to include all builds.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1085-2 emacs24 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1085-2-emacs24/</link>
      <pubDate>Sat, 25 May 2024 09:31:12 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1085-2-emacs24/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1085-2-emacs24/">
      
&lt;p&gt;Package : emacs24&lt;/p&gt;


&lt;p&gt;Version : 24.4&amp;#43;1-5&amp;#43;deb8u4 (jessie), 24.5&amp;#43;1-11&amp;#43;deb9u4 (stretch)&lt;/p&gt;


      &lt;p&gt;The previous update to Emacs did not include builds for all supported
architectures.  The same update has been reissued to include all builds.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1096-1 composer security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1096-1-composer/</link>
      <pubDate>Fri, 24 May 2024 20:24:17 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1096-1-composer/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1096-1-composer/">
      
&lt;p&gt;Package : composer&lt;/p&gt;


&lt;p&gt;Version : 1.2.2-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24828&#34;&gt;CVE-2022-24828&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43655&#34;&gt;CVE-2023-43655&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Composer, an application-level dependency manager for the PHP programming language, was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2022-24828&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json&#39;s `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1089-2 less regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1089-2-less/</link>
      <pubDate>Wed, 22 May 2024 19:34:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1089-2-less/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1089-2-less/">
      
&lt;p&gt;Package : less&lt;/p&gt;


&lt;p&gt;Version : 458-3&amp;#43;deb8u2 (jessie), 481-2.1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;The i386 binaries for the less security update, announced as ELA-1089-1, were
not correctly published in the jessie-security archive. This issue has been
resolved by simply rebuilding the packages. No additional changes have been
made. No further action is required if you use either the amd64 binaries or
Debian 9 &amp;ldquo;stretch&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1095-1 uwsgi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1095-1-uwsgi/</link>
      <pubDate>Sun, 19 May 2024 09:01:10 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1095-1-uwsgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1095-1-uwsgi/">
      
&lt;p&gt;Package : uwsgi&lt;/p&gt;


&lt;p&gt;Version : 2.0.14&amp;#43;20161117-3&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24795&#34;&gt;CVE-2024-24795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;uWSGI, a Web Server Gateway Interface that mainly interfaces between a web server and a python application, allowed an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1094-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1094-1-bind9/</link>
      <pubDate>Fri, 17 May 2024 19:33:12 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1094-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1094-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 9.9.5.dfsg-9&amp;#43;deb8u31 (jessie), 1:9.10.3.dfsg.P4-12.3&amp;#43;deb9u16 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50387&#34;&gt;CVE-2023-50387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50868&#34;&gt;CVE-2023-50868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in BIND, a DNS server implementation, which
may result in denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2023-50387&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Certain DNSSEC aspects of the DNS protocol allow remote attackers to cause
a denial of service via DNSSEC queries. This is known as the &amp;quot;KeyTrap&amp;quot;
issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-50868&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Closest Encloser Proof aspect of the DNS protocol allows remote
attackers to cause a denial of service via DNSSEC queries in a random
subdomain attack. This is known as the &amp;quot;NSEC3&amp;quot; issue.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1093-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1093-1-linux-5.10/</link>
      <pubDate>Mon, 13 May 2024 10:16:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1093-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1093-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.216-1~deb8u1 (jessie), 5.10.216-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6270&#34;&gt;CVE-2023-6270&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-7042&#34;&gt;CVE-2023-7042&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28746&#34;&gt;CVE-2023-28746&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47233&#34;&gt;CVE-2023-47233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52429&#34;&gt;CVE-2023-52429&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52434&#34;&gt;CVE-2023-52434&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52435&#34;&gt;CVE-2023-52435&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52447&#34;&gt;CVE-2023-52447&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52458&#34;&gt;CVE-2023-52458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52482&#34;&gt;CVE-2023-52482&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52486&#34;&gt;CVE-2023-52486&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52488&#34;&gt;CVE-2023-52488&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52489&#34;&gt;CVE-2023-52489&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52491&#34;&gt;CVE-2023-52491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52492&#34;&gt;CVE-2023-52492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52493&#34;&gt;CVE-2023-52493&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52497&#34;&gt;CVE-2023-52497&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52498&#34;&gt;CVE-2023-52498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52583&#34;&gt;CVE-2023-52583&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52587&#34;&gt;CVE-2023-52587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52594&#34;&gt;CVE-2023-52594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52595&#34;&gt;CVE-2023-52595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52597&#34;&gt;CVE-2023-52597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52598&#34;&gt;CVE-2023-52598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52599&#34;&gt;CVE-2023-52599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52600&#34;&gt;CVE-2023-52600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52601&#34;&gt;CVE-2023-52601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52602&#34;&gt;CVE-2023-52602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52603&#34;&gt;CVE-2023-52603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52604&#34;&gt;CVE-2023-52604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52606&#34;&gt;CVE-2023-52606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52607&#34;&gt;CVE-2023-52607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52614&#34;&gt;CVE-2023-52614&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52615&#34;&gt;CVE-2023-52615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52616&#34;&gt;CVE-2023-52616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52617&#34;&gt;CVE-2023-52617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52618&#34;&gt;CVE-2023-52618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52619&#34;&gt;CVE-2023-52619&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52620&#34;&gt;CVE-2023-52620&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52622&#34;&gt;CVE-2023-52622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52623&#34;&gt;CVE-2023-52623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52627&#34;&gt;CVE-2023-52627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52635&#34;&gt;CVE-2023-52635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52637&#34;&gt;CVE-2023-52637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52642&#34;&gt;CVE-2023-52642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52644&#34;&gt;CVE-2023-52644&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52650&#34;&gt;CVE-2023-52650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0340&#34;&gt;CVE-2024-0340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0565&#34;&gt;CVE-2024-0565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0607&#34;&gt;CVE-2024-0607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0841&#34;&gt;CVE-2024-0841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-1151&#34;&gt;CVE-2024-1151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22099&#34;&gt;CVE-2024-22099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23849&#34;&gt;CVE-2024-23849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23850&#34;&gt;CVE-2024-23850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23851&#34;&gt;CVE-2024-23851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24857&#34;&gt;CVE-2024-24857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24858&#34;&gt;CVE-2024-24858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24861&#34;&gt;CVE-2024-24861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26581&#34;&gt;CVE-2024-26581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26593&#34;&gt;CVE-2024-26593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26600&#34;&gt;CVE-2024-26600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26601&#34;&gt;CVE-2024-26601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26602&#34;&gt;CVE-2024-26602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26606&#34;&gt;CVE-2024-26606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26610&#34;&gt;CVE-2024-26610&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26614&#34;&gt;CVE-2024-26614&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26615&#34;&gt;CVE-2024-26615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26622&#34;&gt;CVE-2024-26622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26625&#34;&gt;CVE-2024-26625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26627&#34;&gt;CVE-2024-26627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26635&#34;&gt;CVE-2024-26635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26636&#34;&gt;CVE-2024-26636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26640&#34;&gt;CVE-2024-26640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26641&#34;&gt;CVE-2024-26641&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26642&#34;&gt;CVE-2024-26642&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26643&#34;&gt;CVE-2024-26643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26644&#34;&gt;CVE-2024-26644&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26645&#34;&gt;CVE-2024-26645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26651&#34;&gt;CVE-2024-26651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26654&#34;&gt;CVE-2024-26654&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26659&#34;&gt;CVE-2024-26659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26663&#34;&gt;CVE-2024-26663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26664&#34;&gt;CVE-2024-26664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26665&#34;&gt;CVE-2024-26665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26671&#34;&gt;CVE-2024-26671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26673&#34;&gt;CVE-2024-26673&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26675&#34;&gt;CVE-2024-26675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26679&#34;&gt;CVE-2024-26679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26684&#34;&gt;CVE-2024-26684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26685&#34;&gt;CVE-2024-26685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26687&#34;&gt;CVE-2024-26687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26688&#34;&gt;CVE-2024-26688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26689&#34;&gt;CVE-2024-26689&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26695&#34;&gt;CVE-2024-26695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26696&#34;&gt;CVE-2024-26696&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26697&#34;&gt;CVE-2024-26697&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26698&#34;&gt;CVE-2024-26698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26702&#34;&gt;CVE-2024-26702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26704&#34;&gt;CVE-2024-26704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26707&#34;&gt;CVE-2024-26707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26712&#34;&gt;CVE-2024-26712&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26720&#34;&gt;CVE-2024-26720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26722&#34;&gt;CVE-2024-26722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26727&#34;&gt;CVE-2024-26727&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26733&#34;&gt;CVE-2024-26733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26735&#34;&gt;CVE-2024-26735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26736&#34;&gt;CVE-2024-26736&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26743&#34;&gt;CVE-2024-26743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26744&#34;&gt;CVE-2024-26744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26747&#34;&gt;CVE-2024-26747&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26748&#34;&gt;CVE-2024-26748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26749&#34;&gt;CVE-2024-26749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26751&#34;&gt;CVE-2024-26751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26752&#34;&gt;CVE-2024-26752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26753&#34;&gt;CVE-2024-26753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26754&#34;&gt;CVE-2024-26754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26763&#34;&gt;CVE-2024-26763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26764&#34;&gt;CVE-2024-26764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26766&#34;&gt;CVE-2024-26766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26771&#34;&gt;CVE-2024-26771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26772&#34;&gt;CVE-2024-26772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26773&#34;&gt;CVE-2024-26773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26776&#34;&gt;CVE-2024-26776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26777&#34;&gt;CVE-2024-26777&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26778&#34;&gt;CVE-2024-26778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26779&#34;&gt;CVE-2024-26779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26781&#34;&gt;CVE-2024-26781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26782&#34;&gt;CVE-2024-26782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26787&#34;&gt;CVE-2024-26787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26788&#34;&gt;CVE-2024-26788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26790&#34;&gt;CVE-2024-26790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26791&#34;&gt;CVE-2024-26791&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26793&#34;&gt;CVE-2024-26793&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26795&#34;&gt;CVE-2024-26795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26801&#34;&gt;CVE-2024-26801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26804&#34;&gt;CVE-2024-26804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26805&#34;&gt;CVE-2024-26805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26808&#34;&gt;CVE-2024-26808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26809&#34;&gt;CVE-2024-26809&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26810&#34;&gt;CVE-2024-26810&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26812&#34;&gt;CVE-2024-26812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26813&#34;&gt;CVE-2024-26813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26814&#34;&gt;CVE-2024-26814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26816&#34;&gt;CVE-2024-26816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26817&#34;&gt;CVE-2024-26817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26820&#34;&gt;CVE-2024-26820&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26825&#34;&gt;CVE-2024-26825&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26833&#34;&gt;CVE-2024-26833&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26835&#34;&gt;CVE-2024-26835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26839&#34;&gt;CVE-2024-26839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26840&#34;&gt;CVE-2024-26840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26843&#34;&gt;CVE-2024-26843&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26845&#34;&gt;CVE-2024-26845&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26846&#34;&gt;CVE-2024-26846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26848&#34;&gt;CVE-2024-26848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26851&#34;&gt;CVE-2024-26851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26852&#34;&gt;CVE-2024-26852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26855&#34;&gt;CVE-2024-26855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26857&#34;&gt;CVE-2024-26857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26859&#34;&gt;CVE-2024-26859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26861&#34;&gt;CVE-2024-26861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26862&#34;&gt;CVE-2024-26862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26863&#34;&gt;CVE-2024-26863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26870&#34;&gt;CVE-2024-26870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26872&#34;&gt;CVE-2024-26872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26874&#34;&gt;CVE-2024-26874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26875&#34;&gt;CVE-2024-26875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26877&#34;&gt;CVE-2024-26877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26878&#34;&gt;CVE-2024-26878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26880&#34;&gt;CVE-2024-26880&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26882&#34;&gt;CVE-2024-26882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26883&#34;&gt;CVE-2024-26883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26884&#34;&gt;CVE-2024-26884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26885&#34;&gt;CVE-2024-26885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26889&#34;&gt;CVE-2024-26889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26891&#34;&gt;CVE-2024-26891&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26894&#34;&gt;CVE-2024-26894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26895&#34;&gt;CVE-2024-26895&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26897&#34;&gt;CVE-2024-26897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26898&#34;&gt;CVE-2024-26898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26901&#34;&gt;CVE-2024-26901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26903&#34;&gt;CVE-2024-26903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26906&#34;&gt;CVE-2024-26906&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26907&#34;&gt;CVE-2024-26907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26910&#34;&gt;CVE-2024-26910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26917&#34;&gt;CVE-2024-26917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26920&#34;&gt;CVE-2024-26920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26922&#34;&gt;CVE-2024-26922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26923&#34;&gt;CVE-2024-26923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26924&#34;&gt;CVE-2024-26924&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26925&#34;&gt;CVE-2024-26925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26926&#34;&gt;CVE-2024-26926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26931&#34;&gt;CVE-2024-26931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26934&#34;&gt;CVE-2024-26934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26935&#34;&gt;CVE-2024-26935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26937&#34;&gt;CVE-2024-26937&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26950&#34;&gt;CVE-2024-26950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26951&#34;&gt;CVE-2024-26951&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26955&#34;&gt;CVE-2024-26955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26956&#34;&gt;CVE-2024-26956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26957&#34;&gt;CVE-2024-26957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26958&#34;&gt;CVE-2024-26958&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26960&#34;&gt;CVE-2024-26960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26961&#34;&gt;CVE-2024-26961&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26965&#34;&gt;CVE-2024-26965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26966&#34;&gt;CVE-2024-26966&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26969&#34;&gt;CVE-2024-26969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26970&#34;&gt;CVE-2024-26970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26973&#34;&gt;CVE-2024-26973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26974&#34;&gt;CVE-2024-26974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26976&#34;&gt;CVE-2024-26976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26978&#34;&gt;CVE-2024-26978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26979&#34;&gt;CVE-2024-26979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26981&#34;&gt;CVE-2024-26981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26984&#34;&gt;CVE-2024-26984&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26988&#34;&gt;CVE-2024-26988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26993&#34;&gt;CVE-2024-26993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26994&#34;&gt;CVE-2024-26994&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26997&#34;&gt;CVE-2024-26997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26999&#34;&gt;CVE-2024-26999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27000&#34;&gt;CVE-2024-27000&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27001&#34;&gt;CVE-2024-27001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27004&#34;&gt;CVE-2024-27004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27008&#34;&gt;CVE-2024-27008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27013&#34;&gt;CVE-2024-27013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27020&#34;&gt;CVE-2024-27020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27024&#34;&gt;CVE-2024-27024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27025&#34;&gt;CVE-2024-27025&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27028&#34;&gt;CVE-2024-27028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27030&#34;&gt;CVE-2024-27030&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27038&#34;&gt;CVE-2024-27038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27043&#34;&gt;CVE-2024-27043&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27044&#34;&gt;CVE-2024-27044&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27045&#34;&gt;CVE-2024-27045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27046&#34;&gt;CVE-2024-27046&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27047&#34;&gt;CVE-2024-27047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27051&#34;&gt;CVE-2024-27051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27052&#34;&gt;CVE-2024-27052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27053&#34;&gt;CVE-2024-27053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27059&#34;&gt;CVE-2024-27059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27065&#34;&gt;CVE-2024-27065&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27073&#34;&gt;CVE-2024-27073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27074&#34;&gt;CVE-2024-27074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27075&#34;&gt;CVE-2024-27075&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27076&#34;&gt;CVE-2024-27076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27077&#34;&gt;CVE-2024-27077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27078&#34;&gt;CVE-2024-27078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27388&#34;&gt;CVE-2024-27388&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-27437&#34;&gt;CVE-2024-27437&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1092-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1092-1-php7.0/</link>
      <pubDate>Sat, 11 May 2024 23:21:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1092-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1092-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u17 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2756&#34;&gt;CVE-2024-2756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3096&#34;&gt;CVE-2024-3096&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security problems were found in PHP, a widely-used open source general
purpose scripting language, which could result in information disclosure or
incorrect validation of password hashes.&lt;/p&gt;
&lt;p&gt;CVE-2024-2756&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Marco Squarcina discovered that network and same-site attackers can set a
standard insecure cookie in the victim&#39;s browser which is treated as a
`__Host-` or `__Secure-` cookie by PHP applications.  This issue stems from
an incomplete fix to CVE-2022-31629.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-3096&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Eric Stern discovered that if a password stored with password_hash() starts
with a null byte (\x00), testing a blank string as the password via
password_verify() incorrectly returns true. If a user were able to create
a password with a leading null byte (unlikely, but syntactically valid),
the issue would allow an attacker to trivially compromise the victim&#39;s
account by attempting to sign in with a blank string.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1091-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1091-1-php5/</link>
      <pubDate>Sat, 11 May 2024 23:14:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1091-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1091-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u19 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2756&#34;&gt;CVE-2024-2756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-3096&#34;&gt;CVE-2024-3096&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security problems were found in PHP, a widely-used open source general
purpose scripting language, which could result in information disclosure or
incorrect validation of password hashes.&lt;/p&gt;
&lt;p&gt;CVE-2024-2756&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Marco Squarcina discovered that network and same-site attackers can set a
standard insecure cookie in the victim&#39;s browser which is treated as a
`__Host-` or `__Secure-` cookie by PHP applications.  This issue stems from
an incomplete fix to CVE-2022-31629.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-3096&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Eric Stern discovered that if a password stored with password_hash() starts
with a null byte (\x00), testing a blank string as the password via
password_verify() incorrectly returns true. If a user were able to create
a password with a leading null byte (unlikely, but syntactically valid),
the issue would allow an attacker to trivially compromise the victim&#39;s
account by attempting to sign in with a blank string.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1090-1 gnutls28 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1090-1-gnutls28/</link>
      <pubDate>Fri, 10 May 2024 14:44:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1090-1-gnutls28/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1090-1-gnutls28/">
      
&lt;p&gt;Package : gnutls28&lt;/p&gt;


&lt;p&gt;Version : 3.5.8-5&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4209&#34;&gt;CVE-2021-4209&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A NULL pointer dereference flaw was found in GnuTLS, a library implementing the
TLS and SSL protocols.  As Nettle&amp;rsquo;s hash update functions internally call
memcpy, providing zero-length input may cause undefined behavior. This flaw
possibly leads to a denial of service after authentication.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1089-1 less security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1089-1-less/</link>
      <pubDate>Wed, 08 May 2024 23:27:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1089-1-less/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1089-1-less/">
      
&lt;p&gt;Package : less&lt;/p&gt;


&lt;p&gt;Version : 458-3&amp;#43;deb8u1 (jessie), 481-2.1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48624&#34;&gt;CVE-2022-48624&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-32487&#34;&gt;CVE-2024-32487&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in less, a file pager, which may result
in the execution of arbitrary commands if a file with a specially crafted file
name is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1088-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1088-1-intel-microcode/</link>
      <pubDate>Sun, 05 May 2024 13:19:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1088-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1088-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20240312.1~deb8u1 (jessie), 3.20240312.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22655&#34;&gt;CVE-2023-22655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28746&#34;&gt;CVE-2023-28746&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38575&#34;&gt;CVE-2023-38575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39368&#34;&gt;CVE-2023-39368&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43490&#34;&gt;CVE-2023-43490&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Intel has released microcode updates, addressing serveral vulnerabilties:&lt;/p&gt;
&lt;p&gt;CVE-2023-22655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Protection mechanism failure in some 3rd and 4th Generation Intel(R)
Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow
a privileged user to potentially enable escalation of privilege via
local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28746&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Information exposure through microarchitectural state after
transient execution from some register files for some Intel(R)
Atom(R) Processors may allow an authenticated user to potentially
enable information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38575&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Non-transparent sharing of return predictor targets between contexts
in some Intel(R) Processors may allow an authorized user to
potentially enable information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39368&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Protection mechanism failure of bus lock regulator for some Intel(R)
Processors may allow an unauthenticated user to potentially enable
denial of service via network access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect calculation in microcode keying mechanism for some
Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a
privileged user to potentially enable information disclosure via
local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1087-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1087-1-glibc/</link>
      <pubDate>Sat, 04 May 2024 01:48:46 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1087-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1087-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.19-18&amp;#43;deb8u13 (jessie), 2.24-11&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-2961&#34;&gt;CVE-2024-2961&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Out-of-bounds write in the iconv ISO-2022-CN-EXT module has been fixed&lt;br&gt;
in the GNU C library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1086-1 emacs25 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1086-1-emacs25/</link>
      <pubDate>Fri, 03 May 2024 13:35:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1086-1-emacs25/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1086-1-emacs25/">
      
&lt;p&gt;Package : emacs25&lt;/p&gt;


&lt;p&gt;Version : 25.1&amp;#43;1-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-30203&#34;&gt;CVE-2024-30203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-30204&#34;&gt;CVE-2024-30204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-30205&#34;&gt;CVE-2024-30205&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple problems were discovered in GNU Emacs, the extensible,
customisable, self-documenting display editor.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-30203--cve-2024-30204&#34;&gt;CVE-2024-30203 &amp;amp; CVE-2024-30204&lt;/h3&gt;
&lt;p&gt;In Emacs before 29.3, LaTeX preview is enabled by default for e-mail
attachments in some Emacs MUAs.  This can lead to denial of service.&lt;/p&gt;
&lt;p&gt;(A request has been submitted to MITRE to merge these CVE numbers.)&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-30205&#34;&gt;CVE-2024-30205&lt;/h3&gt;
&lt;p&gt;In Emacs before 29.3, Org mode considers the contents of remote files to be
trusted.  This affects Org Mode before 9.6.23.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1085-1 emacs24 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1085-1-emacs24/</link>
      <pubDate>Fri, 03 May 2024 13:35:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1085-1-emacs24/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1085-1-emacs24/">
      
&lt;p&gt;Package : emacs24&lt;/p&gt;


&lt;p&gt;Version : 24.4&amp;#43;1-5&amp;#43;deb8u3 (jessie), 24.5&amp;#43;1-11&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-30203&#34;&gt;CVE-2024-30203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-30204&#34;&gt;CVE-2024-30204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-30205&#34;&gt;CVE-2024-30205&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple problems were discovered in GNU Emacs, the extensible,
customisable, self-documenting display editor.&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-30203--cve-2024-30204&#34;&gt;CVE-2024-30203 &amp;amp; CVE-2024-30204&lt;/h3&gt;
&lt;p&gt;In Emacs before 29.3, LaTeX preview is enabled by default for e-mail
attachments in some Emacs MUAs.  This can lead to denial of service.&lt;/p&gt;
&lt;p&gt;(A request has been submitted to MITRE to merge these CVE numbers.)&lt;/p&gt;
&lt;h3 id=&#34;cve-2024-30205&#34;&gt;CVE-2024-30205&lt;/h3&gt;
&lt;p&gt;In Emacs before 29.3, Org mode considers the contents of remote files to be
trusted.  This affects Org Mode before 9.6.23.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1084-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1084-1-distro-info-data/</link>
      <pubDate>Wed, 01 May 2024 10:27:40 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1084-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1084-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.36~bpo8&amp;#43;5 (jessie), 0.41&amp;#43;deb10u2~bpo9&amp;#43;5 (stretch)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian
ELTS users.&lt;/p&gt;
&lt;p&gt;It adds Ubuntu 24.10.&lt;/p&gt;
&lt;p&gt;Also included are LTS and ELTS columns for Debian, and ESM columns for
Ubuntu. The versions of distro-info in jessie and stretch are not able
to display the data from these columns, but they are present in the CSV.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1083-1 qtbase-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1083-1-qtbase-opensource-src/</link>
      <pubDate>Wed, 01 May 2024 00:53:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1083-1-qtbase-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1083-1-qtbase-opensource-src/">
      
&lt;p&gt;Package : qtbase-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.7.1&amp;#43;dfsg-3&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24607&#34;&gt;CVE-2023-24607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32763&#34;&gt;CVE-2023-32763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-33285&#34;&gt;CVE-2023-33285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37369&#34;&gt;CVE-2023-37369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38197&#34;&gt;CVE-2023-38197&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in qtbase-opensource-src, a collection of
several Qt modules/libraries.
The issues are related to buffer overflows, infinite loops or application
crashes due to processing of crafted input files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1082-1 phpmyadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1082-1-phpmyadmin/</link>
      <pubDate>Tue, 30 Apr 2024 13:26:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1082-1-phpmyadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1082-1-phpmyadmin/">
      
&lt;p&gt;Package : phpmyadmin&lt;/p&gt;


&lt;p&gt;Version : 4:4.2.12-2&amp;#43;deb8u12 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22452&#34;&gt;CVE-2020-22452&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential SQL injection vulnerability was discovered in phpmyadmin, the
popular MySQL web administration tool.&lt;/p&gt;
&lt;p&gt;This could have been exploited by a malicious storage engine value.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1081-1 ruby-rack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1081-1-ruby-rack/</link>
      <pubDate>Mon, 29 Apr 2024 12:27:30 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1081-1-ruby-rack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1081-1-ruby-rack/">
      
&lt;p&gt;Package : ruby-rack&lt;/p&gt;


&lt;p&gt;Version : 1.6.4-4&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26141&#34;&gt;CVE-2024-26141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-26146&#34;&gt;CVE-2024-26146&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in ruby-rack,
an interface for developing web applications in Ruby.&lt;/p&gt;
&lt;p&gt;CVE-2024-26141&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reject Range headers which are too large
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-26146&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ReDoS in Accept header parsing
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1080-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1080-1-openjdk-8/</link>
      <pubDate>Mon, 29 Apr 2024 11:26:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1080-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1080-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u412-ga-1~deb8u1 (jessie), 8u412-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21011&#34;&gt;CVE-2024-21011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21068&#34;&gt;CVE-2024-21068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21085&#34;&gt;CVE-2024-21085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21094&#34;&gt;CVE-2024-21094&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service or information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1079-1 pillow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1079-1-pillow/</link>
      <pubDate>Sun, 28 Apr 2024 15:48:30 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1079-1-pillow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1079-1-pillow/">
      
&lt;p&gt;Package : pillow&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-2&amp;#43;deb8u10 (jessie), 4.0.0-4&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-28219&#34;&gt;CVE-2024-28219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow in _imagingcms.c was fixed in Pillow, an image processing library for Python.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1078-1 util-linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1078-1-util-linux/</link>
      <pubDate>Fri, 26 Apr 2024 12:44:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1078-1-util-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1078-1-util-linux/">
      
&lt;p&gt;Package : util-linux&lt;/p&gt;


&lt;p&gt;Version : 2.26.2-6&amp;#43;deb8u1 (jessie), 2.29.2-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37600&#34;&gt;CVE-2021-37600&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow attack was discovered in &lt;code&gt;util-linux&lt;/code&gt; which could
have caused a buffer overflow if an attacker were able to use system resources
in a way that leads to a large number in the &lt;code&gt;/proc/sysvipc/sem&lt;/code&gt; file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1077-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1077-1-tomcat8/</link>
      <pubDate>Fri, 26 Apr 2024 06:31:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1077-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1077-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u28 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46589&#34;&gt;CVE-2023-46589&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Norihito Aimoto of OSSTech Corporation discovered a security vulnerability in
the Tomcat servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;A trailer header that exceeded the header size limit could cause Tomcat to
treat a single request as multiple requests leading to the possibility of
request smuggling when behind a reverse proxy.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1076-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1076-1-tomcat7/</link>
      <pubDate>Fri, 26 Apr 2024 06:30:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1076-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1076-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u6 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46589&#34;&gt;CVE-2023-46589&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Norihito Aimoto of OSSTech Corporation discovered a security vulnerability in
the Tomcat servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;A trailer header that exceeded the header size limit could cause Tomcat to
treat a single request as multiple requests leading to the possibility of
request smuggling when behind a reverse proxy.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1075-1 libdatetime-timezone-perl new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1075-1-libdatetime-timezone-perl/</link>
      <pubDate>Wed, 24 Apr 2024 16:05:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1075-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1075-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2024a (jessie), 1:2.09-1&amp;#43;2024a (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2024a for the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1074-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1074-1-tzdata/</link>
      <pubDate>Wed, 24 Apr 2024 15:57:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1074-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1074-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2024a-0&amp;#43;deb8u1 (jessie), 2024a-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2024a. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;ul&gt;
&lt;li&gt;Kazakhstan unifies on UTC+5 beginning 2024-03-01.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;ul&gt;
&lt;li&gt;Palestine springs forward a week later after Ramadan.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1073-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1073-1-expat/</link>
      <pubDate>Sat, 20 Apr 2024 11:05:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1073-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1073-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-6&amp;#43;deb8u11 (jessie), 2.2.0-2&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52425&#34;&gt;CVE-2023-52425&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Expat, an XML parsing C library has been found to have an vulnerability that
allows an attacker to perform a denial of service (resource consumption), when
many full reparsings are required in the case of a large tokens.&lt;/p&gt;
&lt;p&gt;When parsing a really big token that requires multiple buffer fills to
complete, expat has to re-parse the token from start multiple times, which
takes time. These patches introduce a heuristic that, when having failed on the
same token multiple times, defers further parsing until there&amp;rsquo;s significantly
more data available.&lt;/p&gt;
&lt;p&gt;The patch also introduces an optional API, XML_SetReparseDeferralEnabled() to
disable the new heuristic.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1072-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1072-1-xorg-server/</link>
      <pubDate>Tue, 16 Apr 2024 21:40:00 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1072-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1072-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u16 (jessie), 2:1.19.2-1&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31080&#34;&gt;CVE-2024-31080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31081&#34;&gt;CVE-2024-31081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-31083&#34;&gt;CVE-2024-31083&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the Xorg X server.&lt;/p&gt;
&lt;p&gt;CVE-2024-31080&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer overread in ProcXIGetSelectedEvents()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31081&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer overread in ProcXIPassiveGrabDevice()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-31083&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use-after-free in ProcRenderAddGlyphs()
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1071-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1071-1-tomcat8/</link>
      <pubDate>Thu, 11 Apr 2024 11:41:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1071-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1071-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.5.54-0&amp;#43;deb9u15 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23672&#34;&gt;CVE-2024-23672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24549&#34;&gt;CVE-2024-24549&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2024-24549&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Denial of Service due to improper input validation vulnerability for
 HTTP/2. When processing an HTTP/2 request, if the request exceeded any of
 the configured limits for headers, the associated HTTP/2 stream was not
 reset until after all of the headers had been processed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-23672&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Denial of Service via incomplete cleanup vulnerability. It was possible
 for WebSocket clients to keep WebSocket connections open leading to
 increased resource consumption.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1070-1 libcaca security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1070-1-libcaca/</link>
      <pubDate>Sun, 07 Apr 2024 10:48:47 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1070-1-libcaca/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1070-1-libcaca/">
      
&lt;p&gt;Package : libcaca&lt;/p&gt;


&lt;p&gt;Version : 0.99.beta19-2&amp;#43;deb8u3 (jessie), 0.99.beta19-2.2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30498&#34;&gt;CVE-2021-30498&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30499&#34;&gt;CVE-2021-30499&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in libcaca, a colour ASCII art library.
Both are related to heap buffer overflow, which might lead to memory
corruption.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1069-1 libgd2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1069-1-libgd2/</link>
      <pubDate>Sun, 07 Apr 2024 01:44:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1069-1-libgd2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1069-1-libgd2/">
      
&lt;p&gt;Package : libgd2&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-5&amp;#43;deb8u15 (jessie), 2.2.4-2&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14553&#34;&gt;CVE-2018-14553&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38115&#34;&gt;CVE-2021-38115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40812&#34;&gt;CVE-2021-40812&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in libgd2, a GD Graphics Library.
They are related to out-of-bounds reads or NULL pointer derefence allowing
denial of service attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1068-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1068-1-curl/</link>
      <pubDate>Tue, 26 Mar 2024 21:17:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1068-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1068-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.52.1-5&amp;#43;deb9u21 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27534&#34;&gt;CVE-2023-27534&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28321&#34;&gt;CVE-2023-28321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28322&#34;&gt;CVE-2023-28322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46218&#34;&gt;CVE-2023-46218&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;curl, a tool for transferring data using various network protocols, was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2023-27534&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A path traversal vulnerability existed in curl implementation that causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user&#39;s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28321&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An improper certificate validation vulnerability existed in curl in the way it supports matching of wildcard patterns when listed as &amp;quot;Subject Alternative Name&amp;quot; (SNA) in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28322&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An information disclosure vulnerability existed in curl when doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously was used to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-46218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This flaw allowed a malicious HTTP server to set &amp;quot;super cookies&amp;quot; in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl&#39;s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with domain=co.UK when the URL used a lower case hostname curl.co.uk, even though co.uk is listed as a PSL domain. 
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1067-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1067-1-python3.4/</link>
      <pubDate>Sun, 24 Mar 2024 23:57:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1067-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1067-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u17 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0450&#34;&gt;CVE-2024-0450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The zipfile module was vulnerable to “quoted-overlap” zip-bombs
in the Python 3 interpreter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1066-1 python3.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1066-1-python3.5/</link>
      <pubDate>Sun, 24 Mar 2024 23:55:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1066-1-python3.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1066-1-python3.5/">
      
&lt;p&gt;Package : python3.5&lt;/p&gt;


&lt;p&gt;Version : 3.5.3-1&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0450&#34;&gt;CVE-2024-0450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The zipfile module was vulnerable to “quoted-overlap” zip-bombs
in the Python 3 interpreter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1065-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1065-1-python2.7/</link>
      <pubDate>Sun, 24 Mar 2024 23:42:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1065-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1065-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1-1&amp;#43;deb8u12 (jessie), 2.7.13-2&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0450&#34;&gt;CVE-2024-0450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The zipfile module was vulnerable to “quoted-overlap” zip-bombs
in the Python 2 interpreter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1064-1 wpa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1064-1-wpa/</link>
      <pubDate>Sun, 24 Mar 2024 19:01:24 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1064-1-wpa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1064-1-wpa/">
      
&lt;p&gt;Package : wpa&lt;/p&gt;


&lt;p&gt;Version : 2.3-1&amp;#43;deb8u14 (jessie), 2:2.4-1&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-52160&#34;&gt;CVE-2023-52160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The implementation of PEAP in wpa_supplicant allowed authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network&amp;rsquo;s TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1063-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1063-1-qemu/</link>
      <pubDate>Sun, 24 Mar 2024 19:52:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1063-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1063-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.8&amp;#43;dfsg-6&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14394&#34;&gt;CVE-2020-14394&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0330&#34;&gt;CVE-2023-0330&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2861&#34;&gt;CVE-2023-2861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3180&#34;&gt;CVE-2023-3180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3354&#34;&gt;CVE-2023-3354&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5088&#34;&gt;CVE-2023-5088&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the machine emulator
and virtualizer QEMU.&lt;/p&gt;
&lt;p&gt;CVE-2020-14394&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;infinite loop in the USB xHCI controller emulation
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0330&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;reentrancy issues in the LSI controller
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2861&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;9pfs did not prohibit opening special files on the host side
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3180&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;heap buffer overflow in the virtual crypto device
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3354&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;remote unauthenticated clients could cause denial of service in VNC server
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5088&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;IDE guest I/O operation addressed to an arbitrary disk offset might get targeted to offset 0 instead
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1062-1 libnet-cidr-lite-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1062-1-libnet-cidr-lite-perl/</link>
      <pubDate>Sat, 23 Mar 2024 17:28:24 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1062-1-libnet-cidr-lite-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1062-1-libnet-cidr-lite-perl/">
      
&lt;p&gt;Package : libnet-cidr-lite-perl&lt;/p&gt;


&lt;p&gt;Version : 0.21-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-47154&#34;&gt;CVE-2021-47154&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libnet-cidr-lite-perl, a module for merging
IPv4 or IPv6 CIDR address ranges.&lt;/p&gt;
&lt;p&gt;Extraneous zero characters at the beginning of an IP address string
might allow attackers to bypass access control that is based on IP
addresses.&lt;/p&gt;
&lt;p&gt;Please check your application whether it accidentally allows such leading
zero characters (that are normally meant to indicate octal numbers).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1061-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1061-1-postgresql-9.4/</link>
      <pubDate>Wed, 20 Mar 2024 23:00:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1061-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1061-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u9 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0985&#34;&gt;CVE-2024-0985&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In the PostgreSQL database server, a late privilege drop in the
REFRESH MATERIALIZED VIEW CONCURRENTLY command could allow an
attacker to trick a user with higher privileges to run SQL commands.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1060-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1060-1-postgresql-9.6/</link>
      <pubDate>Wed, 20 Mar 2024 22:57:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1060-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1060-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0985&#34;&gt;CVE-2024-0985&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In the PostgreSQL database server, a late privilege drop in the
REFRESH MATERIALIZED VIEW CONCURRENTLY command could allow an
attacker to trick a user with higher privileges to run SQL commands.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1059-1 pillow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1059-1-pillow/</link>
      <pubDate>Tue, 19 Mar 2024 13:42:17 +0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1059-1-pillow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1059-1-pillow/">
      
&lt;p&gt;Package : pillow&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-2&amp;#43;deb8u9 (jessie), 4.0.0-4&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23437&#34;&gt;CVE-2021-23437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22817&#34;&gt;CVE-2022-22817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44271&#34;&gt;CVE-2023-44271&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50447&#34;&gt;CVE-2023-50447&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in the Python Imaging Library (PIL),
an image processing library for Python.&lt;/p&gt;
&lt;h3 id=&#34;cve-2021-23437&#34;&gt;CVE-2021-23437&lt;/h3&gt;
&lt;p&gt;It was discovered that the getrgb function was vulnerable to a regular
expression denial-of-service attack.&lt;/p&gt;
&lt;h3 id=&#34;cve-2022-22817&#34;&gt;CVE-2022-22817&lt;/h3&gt;
&lt;p&gt;A fix for this CVE was announced in advisories DLA-2893-1 and ELA-546-1.  It
was discovered that this fix was incomplete.  This update completes the fix.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-44271&#34;&gt;CVE-2023-44271&lt;/h3&gt;
&lt;p&gt;It was discovered that an overlong text length argument passed to an ImageDraw
instance could cause uncontrollable memory allocation and denial-of-service.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-50447&#34;&gt;CVE-2023-50447&lt;/h3&gt;
&lt;p&gt;It was discovered that PIL.ImageMath.eval could permit arbitrary code
execution via the environment parameter (see also CVE-2022-22817, which
concerned the expression parameter).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1058-1 kde4libs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1058-1-kde4libs/</link>
      <pubDate>Tue, 19 Mar 2024 02:19:15 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1058-1-kde4libs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1058-1-kde4libs/">
      
&lt;p&gt;Package : kde4libs&lt;/p&gt;


&lt;p&gt;Version : 4:4.14.26-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14744&#34;&gt;CVE-2019-14744&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Dominik Penner discovered a flaw in how KConfig interpreted shell commands
in desktop files and other configuration files. An attacker may trick users
into installing specially crafted files which could then be used to execute
arbitrary code, e.g. a file manager trying to find out the icon for a file
or any application using KConfig. Thus the entire feature of supporting
shell commands in KConfig entries has been removed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1057-1 inetutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1057-1-inetutils/</link>
      <pubDate>Tue, 19 Mar 2024 02:08:12 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1057-1-inetutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1057-1-inetutils/">
      
&lt;p&gt;Package : inetutils&lt;/p&gt;


&lt;p&gt;Version : 2:1.9.2.39.3a460-3&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0053&#34;&gt;CVE-2019-0053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40491&#34;&gt;CVE-2021-40491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39028&#34;&gt;CVE-2022-39028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40303&#34;&gt;CVE-2023-40303&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in the inetutils package, a collection
of common network programs.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-0053&lt;/p&gt;
&lt;p&gt;A stack-based overflow is present in the handling of environment variables
when connecting via the telnet client to remote telnet servers. This issue
only affects the telnet client — accessible from the CLI or shell — in
Junos OS. Inbound telnet services are not affected by this issue.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-40491&lt;/p&gt;
&lt;p&gt;The ftp client in inetutils does not validate addresses returned by
PASV/LSPV responses to make sure they match the server address.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39028&lt;/p&gt;
&lt;p&gt;telnetd in inetutils has a NULL pointer dereference via 0xff 0xf7 or 0xff
0xf8. In a typical installation, the telnetd application would crash but
the telnet service would remain available through inetd. However, if the
telnetd application has many crashes within a short time interval, the
telnet service would become unavailable after inetd logs a &amp;ldquo;telnet/tcp
server failing (looping), service terminated&amp;rdquo; error.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-40303&lt;/p&gt;
&lt;p&gt;inetutils may allow privilege escalation because of unchecked return values
of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd.
This is, for example, relevant if the setuid system call fails when a
process is trying to drop privileges before letting an ordinary user
control the activities of the process.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1056-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1056-1-python3.4/</link>
      <pubDate>Mon, 18 Mar 2024 17:10:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1056-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1056-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u16 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48560&#34;&gt;CVE-2022-48560&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48564&#34;&gt;CVE-2022-48564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48565&#34;&gt;CVE-2022-48565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48566&#34;&gt;CVE-2022-48566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40217&#34;&gt;CVE-2023-40217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in python3.4, an interactive
high-level object-oriented language. An attacker could cause DoS
(denial-of-service) situations, exfiltrate private information, and
possibly execute arbitrary code.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-48560&lt;/p&gt;
&lt;p&gt;A use-after-free exists via heappushpop in heapq.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-48564&lt;/p&gt;
&lt;p&gt;read_ints in plistlib.py is vulnerable to a potential DoS attack
via CPU and RAM exhaustion when processing malformed Apple
Property List files in binary format.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-48565&lt;/p&gt;
&lt;p&gt;An XML External Entity (XXE) issue was discovered. The
plistlib module no longer accepts entity declarations in XML plist
files to avoid XML vulnerabilities.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-48566&lt;/p&gt;
&lt;p&gt;In compare_digest in Lib/hmac.py, constant-time-defeating
optimisations were possible in the accumulator variable in
hmac.compare_digest.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-40217&lt;/p&gt;
&lt;p&gt;If a TLS server-side socket is created, receives data into the
socket buffer, and then is closed quickly, there is a brief window
where the SSLSocket instance will detect the socket as &amp;ldquo;not
connected&amp;rdquo; and won&amp;rsquo;t initiate a handshake, but buffered data will
still be readable from the socket buffer.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1055-1 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1055-1-openssh/</link>
      <pubDate>Mon, 11 Mar 2024 12:41:11 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1055-1-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1055-1-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:6.7p1-5&amp;#43;deb8u10 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41617&#34;&gt;CVE-2021-41617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51385&#34;&gt;CVE-2023-51385&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenSSH, an implementation of
the SSH protocol suite.&lt;/p&gt;
&lt;p&gt;CVE-2021-41617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that sshd failed to correctly initialise supplemental
groups when executing an AuthorizedKeysCommand or
AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
AuthorizedPrincipalsCommandUser directive has been set to run the command
as a different user. Instead these commands would inherit the groups that
sshd was started with.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51385&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that if an invalid user or hostname that contained shell
metacharacters was passed to ssh, and a ProxyCommand, LocalCommand
directive or &amp;quot;match exec&amp;quot; predicate referenced the user or hostname via
expansion tokens, then an attacker who could supply arbitrary
user/hostnames to ssh could potentially perform command injection. The
situation could arise in case of git repositories with submodules, where the
repository could contain a submodule with shell characters in its user or
hostname.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Unfortunately, the changes required to fix the Terrapin Attack (CVE-2023-48795)
in jessie are too intrusive to be backported and represent a high risk of
introducing regressions. We also concluded that the Terrapin Attack is hardly
exploitable on the server side of the OpenSSH packaged in jessie, since it does
not support &lt;code&gt;EXT_INFO&lt;/code&gt; messages, which are required to take advantage of the
attack. To mitigate this attack, we recommend to OpenSSH users to disable the
ChaCha20-Poly1305 algorithm from the allowed cipher suites used by both OpenSSH
client and server. For convenience, we include here examples of the &lt;code&gt;Ciphers&lt;/code&gt;
configuration option that can be used removing ChaCha20-Poly1305 from the
default list. This is the example for OpenSSH server&amp;rsquo;s &lt;code&gt;/etc/ssh/sshd_config&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;And this is for system-wise OpenSSH client&amp;rsquo;s &lt;code&gt;/etc/ssh/ssh_config&lt;/code&gt;:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Users should adapt those examples to their local configuration.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1054-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1054-1-nss/</link>
      <pubDate>Mon, 11 Mar 2024 06:54:24 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1054-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1054-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u18 (jessie), 2:3.26.2-1.1&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4421&#34;&gt;CVE-2023-4421&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5388&#34;&gt;CVE-2023-5388&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0743&#34;&gt;CVE-2024-0743&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in nss, a set of libraries designed
to support cross-platform development of security-enabled client and
server applications.&lt;/p&gt;
&lt;p&gt;CVE-2023-4421&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A fuzzing project discovered vulnerabilities to Bleichenbacher
timing attacks in NSS&#39;s facilities for RSA cryptography.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5388&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A timing attack against RSA decryption in TLS. This vulnerablity has been
named The MArvin Attack a Bleichenbacher-like vulernability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-0743&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An unchecked return value in TLS handshake code could have caused a
potentially exploitable crash.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1053-1 libgit2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1053-1-libgit2/</link>
      <pubDate>Sun, 03 Mar 2024 16:39:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1053-1-libgit2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1053-1-libgit2/">
      
&lt;p&gt;Package : libgit2&lt;/p&gt;


&lt;p&gt;Version : 0.25.1&amp;#43;really0.24.6-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-24577&#34;&gt;CVE-2024-24577&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Arbitrary code execution in git_index_add has been fixed in libgit2,
a library implementing the Git core methods.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1052-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1052-1-wireshark/</link>
      <pubDate>Thu, 29 Feb 2024 23:56:36 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1052-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1052-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 2.6.20-0&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4511&#34;&gt;CVE-2023-4511&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4513&#34;&gt;CVE-2023-4513&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6175&#34;&gt;CVE-2023-6175&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0208&#34;&gt;CVE-2024-0208&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the network traffic analyzer Wireshark.&lt;/p&gt;
&lt;p&gt;CVE-2023-4511&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;BT SDP dissector infinite loop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4513&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;BT SDP dissector memory leak
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6175&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NetScreen file parser crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2024-0208&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GVCP dissector crash
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1051-1 gsoap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1051-1-gsoap/</link>
      <pubDate>Thu, 29 Feb 2024 23:51:06 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1051-1-gsoap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1051-1-gsoap/">
      
&lt;p&gt;Package : gsoap&lt;/p&gt;


&lt;p&gt;Version : 2.8.35-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13574&#34;&gt;CVE-2020-13574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13575&#34;&gt;CVE-2020-13575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13576&#34;&gt;CVE-2020-13576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13577&#34;&gt;CVE-2020-13577&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13578&#34;&gt;CVE-2020-13578&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the gSOAP toolkit for
developing Web services.&lt;/p&gt;
&lt;p&gt;CVE-2020-13574&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WS-Security plugin denial-of-service
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-13575&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WS-Addressing plugin denial-of-service
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-13576&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WS-Addressing plugin code execution
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-13577&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WS-Security plugin denial-of-service
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-13578&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WS-Security plugin denial-of-service
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1050-1 php-phpseclib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1050-1-php-phpseclib/</link>
      <pubDate>Thu, 29 Feb 2024 21:27:27 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1050-1-php-phpseclib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1050-1-php-phpseclib/">
      
&lt;p&gt;Package : php-phpseclib&lt;/p&gt;


&lt;p&gt;Version : 2.0.30-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-48795&#34;&gt;CVE-2023-48795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Terrapin attack is a cryptographic attack on the SSH prootocol reducing the security of SSH, by using a downgrade attack via man-in-the-middle interception.
By carefully adjusting the sequence numbers during the handshake, an attacker can remove an arbitrary amount of messages sent by the client or server at the beginning of the secure channel without the client or server noticing it.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1049-1 evince security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1049-1-evince/</link>
      <pubDate>Thu, 29 Feb 2024 20:38:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1049-1-evince/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1049-1-evince/">
      
&lt;p&gt;Package : evince&lt;/p&gt;


&lt;p&gt;Version : 3.22.1-3&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51698&#34;&gt;CVE-2023-51698&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A security vulnerability was found in Evince, a document viewer, which may grant
an attacker immediate access to the target system when the target user opens a
crafted document or clicks on a crafted link/URL using a maliciously crafted
CBT (comic book archive) document which is a TAR archive. The comic book
backend of Evince uses libarchive now, which handles CBT and other comic book
archives correctly.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1048-1 jinja2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1048-1-jinja2/</link>
      <pubDate>Sun, 25 Feb 2024 22:59:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1048-1-jinja2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1048-1-jinja2/">
      
&lt;p&gt;Package : jinja2&lt;/p&gt;


&lt;p&gt;Version : 2.7.3-1&amp;#43;deb8u1 (jessie), 2.8-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-22195&#34;&gt;CVE-2024-22195&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an injection attack in jinja2, a
popular templating engine used in various Python applications.&lt;/p&gt;
&lt;p&gt;It was possible to inject arbitrary HTML attributes into rendered
HTML via the &amp;ldquo;xmlattr&amp;rdquo; filter, potentially leading to a Cross-Site
Scripting (XSS) attack. It may also have been possible to bypass
attribute validation checks if they were blacklist-based.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1047-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1047-1-bind9/</link>
      <pubDate>Sun, 25 Feb 2024 09:34:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1047-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1047-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u30 (jessie), 1:9.10.3.dfsg.P4-12.3&amp;#43;deb9u15 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3341&#34;&gt;CVE-2023-3341&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been discovered in BIND, a DNS server implementation.&lt;/p&gt;
&lt;p&gt;A stack exhaustion flaw was discovered in the control channel code
which may result in denial of service (named daemon crash).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1046-1 unbound1.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1046-1-unbound1.9/</link>
      <pubDate>Sat, 24 Feb 2024 11:49:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1046-1-unbound1.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1046-1-unbound1.9/">
      
&lt;p&gt;Package : unbound1.9&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u2~deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50387&#34;&gt;CVE-2023-50387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50868&#34;&gt;CVE-2023-50868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in unbound, a validating, recursive,
caching DNS resolver. Specially crafted DNSSEC answers could lead unbound
down a very CPU intensive and time costly DNSSEC (CVE-2023-50387) or NSEC3
hash (CVE-2023-50868) validation path, resulting in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1045-1 phpseclib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1045-1-phpseclib/</link>
      <pubDate>Fri, 23 Feb 2024 20:24:41 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1045-1-phpseclib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1045-1-phpseclib/">
      
&lt;p&gt;Package : phpseclib&lt;/p&gt;


&lt;p&gt;Version : 1.0.19-1~deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-48795&#34;&gt;CVE-2023-48795&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;phpseclib, a library used for secure communication written in PHP language, was
vulnerable to so called Terrapin-Attack. The SSH transport protocol, with
certain OpenSSH extensions, allows remote attackers to bypass
integrity checks such that some packets are omitted
(from the extension negotiation message), and a client and
server may consequently end up with a connection for which some security
features have been downgraded or disabled.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1044-1 optipng security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1044-1-optipng/</link>
      <pubDate>Fri, 23 Feb 2024 13:09:56 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1044-1-optipng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1044-1-optipng/">
      
&lt;p&gt;Package : optipng&lt;/p&gt;


&lt;p&gt;Version : 0.7.5-1&amp;#43;deb8u3 (jessie), 0.7.6-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-7802&#34;&gt;CVE-2015-7802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43907&#34;&gt;CVE-2023-43907&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Optipng, a tool for optimizing image files, by recompressesing image files to a smaller size,
without losing any information, was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2015-7802&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Under Debian 8 (jessie), optipng allowed remote attackers to cause a denial of service (uninitialized memory read) via a crafted GIF file. Debian 9, stretch, was already fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43907&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A global buffer overflow via the &#39;buffer&#39; variable at gifread.c, was found.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1043-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1043-1-xorg-server/</link>
      <pubDate>Sat, 10 Feb 2024 23:46:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1043-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1043-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u15 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6816&#34;&gt;CVE-2023-6816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0229&#34;&gt;CVE-2024-0229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0408&#34;&gt;CVE-2024-0408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0409&#34;&gt;CVE-2024-0409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21885&#34;&gt;CVE-2024-21885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21886&#34;&gt;CVE-2024-21886&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Xorg X server, which may
result in privilege escalation if the X server is running privileged
or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1042-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1042-1-sudo/</link>
      <pubDate>Sat, 03 Feb 2024 18:15:38 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1042-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1042-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.19p1-2.1&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28486&#34;&gt;CVE-2023-28486&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28487&#34;&gt;CVE-2023-28487&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Sudo, a program designed to allow a sysadmin to give limited
root privileges to users and log root activity, was vulnerable.&lt;/p&gt;
&lt;p&gt;CVE-2023-28486&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sudo did not escape control characters in log messages.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28487&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sudo did not escape control characters in sudoreplay output.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1041-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1041-1-zabbix/</link>
      <pubDate>Sat, 03 Feb 2024 15:49:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1041-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1041-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 2.2.23&amp;#43;dfsg-0&amp;#43;deb8u7 (jessie), 1:3.0.32&amp;#43;dfsg-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32721&#34;&gt;CVE-2023-32721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32726&#34;&gt;CVE-2023-32726&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a
network monitoring solution, potentially allowing an attacker to perform
a stored XSS, Server-Side Request Forgery (SSRF), exposure of sensitive
information, a system crash, or arbitrary code execution.&lt;/p&gt;
&lt;p&gt;CVE-2023-32721&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A stored XSS has been found in the Zabbix web application in the
Maps element if a URL field is set with spaces before URL.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32726&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Possible buffer overread from reading DNS responses.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1040-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1040-1-xorg-server/</link>
      <pubDate>Wed, 31 Jan 2024 22:09:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1040-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1040-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.19.2-1&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6816&#34;&gt;CVE-2023-6816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0229&#34;&gt;CVE-2024-0229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0408&#34;&gt;CVE-2024-0408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-0409&#34;&gt;CVE-2024-0409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21885&#34;&gt;CVE-2024-21885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-21886&#34;&gt;CVE-2024-21886&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Xorg X server, which may
result in privilege escalation if the X server is running privileged
or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1039-1 postfix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1039-1-postfix/</link>
      <pubDate>Wed, 31 Jan 2024 09:28:33 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1039-1-postfix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1039-1-postfix/">
      
&lt;p&gt;Package : postfix&lt;/p&gt;


&lt;p&gt;Version : 2.11.3-1&amp;#43;deb8u3 (jessie), 3.1.15-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51764&#34;&gt;CVE-2023-51764&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Postfix, a popular mail server, was vulnerable.&lt;/p&gt;
&lt;p&gt;Postfix allowed SMTP smuggling unless configured with
&lt;code&gt;smtpd_data_restrictions=reject_unauth_pipelining&lt;/code&gt; and
&lt;code&gt;smtpd_discard_ehlo_keywords=chunking&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Remote attackers can use a published exploitation technique
to inject e-mail messages with a spoofed &lt;code&gt;MAIL FROM&lt;/code&gt; address, allowing bypass
of an SPF protection mechanism.&lt;/p&gt;
&lt;p&gt;This occurs because Postfix supports &lt;code&gt;&amp;lt;LF&amp;gt;.&amp;lt;CR&amp;gt;&amp;lt;LF&amp;gt;&lt;/code&gt; but some other popular e-mail servers do not.
To prevent attack variants (by always disallowing &lt;code&gt;&amp;lt;LF&amp;gt;&lt;/code&gt; without &lt;code&gt;&amp;lt;CR&amp;gt;&lt;/code&gt;),
a different solution is required, such as using the backported &lt;code&gt;smtpd_forbid_bare_newline=yes&lt;/code&gt; option.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1038-1 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1038-1-openssh/</link>
      <pubDate>Tue, 30 Jan 2024 18:36:48 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1038-1-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1038-1-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:7.4p1-10&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41617&#34;&gt;CVE-2021-41617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-48795&#34;&gt;CVE-2023-48795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51385&#34;&gt;CVE-2023-51385&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenSSH, an implementation of
the SSH protocol suite.&lt;/p&gt;
&lt;p&gt;CVE-2021-41617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that sshd failed to correctly initialise supplemental
groups when executing an AuthorizedKeysCommand or
AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
AuthorizedPrincipalsCommandUser directive has been set to run the command
as a different user. Instead these commands would inherit the groups that
sshd was started with.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-48795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH
protocol is prone to a prefix truncation attack, known as the &amp;quot;Terrapin
attack&amp;quot;. This attack allows a MITM attacker to effect a limited break of the
integrity of the early encrypted SSH transport protocol by sending extra
messages prior to the commencement of encryption, and deleting an equal
number of consecutive messages immediately after encryption starts.

Details can be found at https://terrapin-attack.com/
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51385&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that if an invalid user or hostname that contained shell
metacharacters was passed to ssh, and a ProxyCommand, LocalCommand
directive or &amp;quot;match exec&amp;quot; predicate referenced the user or hostname via
expansion tokens, then an attacker who could supply arbitrary
user/hostnames to ssh could potentially perform command injection. The
situation could arise in case of git repositories with submodules, where the
repository could contain a submodule with shell characters in its user or
hostname.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1037-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1037-1-squid3/</link>
      <pubDate>Tue, 30 Jan 2024 22:36:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1037-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1037-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u7 (jessie), 3.5.23-5&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46847&#34;&gt;CVE-2023-46847&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49285&#34;&gt;CVE-2023-49285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49286&#34;&gt;CVE-2023-49286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-50269&#34;&gt;CVE-2023-50269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-23638&#34;&gt;CVE-2024-23638&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Squid, a full featured
web proxy cache. Due to programming errors in Squid&amp;rsquo;s HTTP request parsing,
remote attackers may be able to execute a denial of service attack by sending
large X-Forwarded-For header or trigger a stack buffer overflow while
performing HTTP Digest authentication. Other issues facilitate a denial of
service attack against Squid&amp;rsquo;s Helper process management. In regard to
CVE-2023-46728: Please note that support for the Gopher protocol has simply
been removed in future Squid versions. There is no fix available. We recommend
to reject all gopher URL requests instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1036-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1036-1-jasper/</link>
      <pubDate>Tue, 30 Jan 2024 19:30:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1036-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1036-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-debian1-2.4&amp;#43;deb8u12 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51257&#34;&gt;CVE-2023-51257&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in jasper, a library and programs for manipulating JPEG-2000 files.
The issue is about an invalid memory write which might allow a local attacker to execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1035-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1035-1-openjdk-8/</link>
      <pubDate>Fri, 26 Jan 2024 10:10:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1035-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1035-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u402-ga-1~deb8u1 (jessie), 8u402-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20918&#34;&gt;CVE-2024-20918&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20919&#34;&gt;CVE-2024-20919&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20921&#34;&gt;CVE-2024-20921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20926&#34;&gt;CVE-2024-20926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20945&#34;&gt;CVE-2024-20945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2024-20952&#34;&gt;CVE-2024-20952&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in side channel attacks, leaking sensitive data to log
files, denial of service or bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1034-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1034-1-linux-4.19/</link>
      <pubDate>Thu, 25 Jan 2024 11:45:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1034-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1034-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.304-1~deb8u1 (jessie), 4.19.304-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44879&#34;&gt;CVE-2021-44879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0590&#34;&gt;CVE-2023-0590&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1077&#34;&gt;CVE-2023-1077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1206&#34;&gt;CVE-2023-1206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1989&#34;&gt;CVE-2023-1989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3212&#34;&gt;CVE-2023-3212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3390&#34;&gt;CVE-2023-3390&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3609&#34;&gt;CVE-2023-3609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3611&#34;&gt;CVE-2023-3611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3772&#34;&gt;CVE-2023-3772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3776&#34;&gt;CVE-2023-3776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4206&#34;&gt;CVE-2023-4206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4207&#34;&gt;CVE-2023-4207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4208&#34;&gt;CVE-2023-4208&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4244&#34;&gt;CVE-2023-4244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4622&#34;&gt;CVE-2023-4622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4623&#34;&gt;CVE-2023-4623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4921&#34;&gt;CVE-2023-4921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5717&#34;&gt;CVE-2023-5717&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6606&#34;&gt;CVE-2023-6606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6931&#34;&gt;CVE-2023-6931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6932&#34;&gt;CVE-2023-6932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25775&#34;&gt;CVE-2023-25775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34319&#34;&gt;CVE-2023-34319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34324&#34;&gt;CVE-2023-34324&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35001&#34;&gt;CVE-2023-35001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39189&#34;&gt;CVE-2023-39189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39192&#34;&gt;CVE-2023-39192&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39193&#34;&gt;CVE-2023-39193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39194&#34;&gt;CVE-2023-39194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40283&#34;&gt;CVE-2023-40283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42753&#34;&gt;CVE-2023-42753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42754&#34;&gt;CVE-2023-42754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42755&#34;&gt;CVE-2023-42755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45863&#34;&gt;CVE-2023-45863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45871&#34;&gt;CVE-2023-45871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51780&#34;&gt;CVE-2023-51780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51781&#34;&gt;CVE-2023-51781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51782&#34;&gt;CVE-2023-51782&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-44879&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wenqing Liu reported a NULL pointer dereference in the f2fs
implementation. An attacker able to mount a specially crafted image
can take advantage of this flaw for denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0590&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dmitry Vyukov discovered a race condition in the network scheduler
core that that can lead to a use-after-free.  A local user with
the CAP_NET_ADMIN capability in any user or network namespace
could exploit this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1077&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the task
scheduler.  A local user might be able to exploit this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1206&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the networking stack permits attackers to
force hash collisions in the IPv6 connection lookup table, which
may result in denial of service (significant increase in the cost
of lookups, increased CPU utilization).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1989&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the btsdio Bluetooth
adapter driver that can lead to a use-after-free.  An attacker
able to insert and remove SDIO devices can use this to cause a
denial of service (crash or memory corruption) or possibly to run
arbitrary code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3212&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yang Lan discovered that missing validation in the GFS2 filesystem
could result in denial of service via a NULL pointer dereference
when mounting a malformed GFS2 filesystem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3390&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw in the netfilter subsystem caused by
incorrect error path handling may result in denial of service or
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3609, CVE-2023-3776, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a use-after-free in the cls_fw, cls_u32,
cls_route and network classifiers may result in denial of service
or potential local privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3611&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that an out-of-bounds write in the traffic
control subsystem for the Quick Fair Queueing scheduler (QFQ) may
result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3772&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lin Ma discovered a NULL pointer dereference flaw in the XFRM
subsystem which may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4244&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was found in the nftables subsystem that could
lead to a use-after-free.  A local user could exploit this to
cause a denial of service (crash), information leak, or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4622&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Bing-Jhong Billy Jheng discovered a use-after-free within the Unix
domain sockets component, which may result in local privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4623&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Budimir Markovic reported a missing configuration check in the
sch_hfsc network scheduler that could lead to a use-after-free or
other problems.  A local user with the CAP_NET_ADMIN capability in
any user or network namespace could exploit this to cause a denial
of service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4921&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;valis&amp;quot; reported flaws in the sch_qfq network scheduler that could
lead to a use-after-free.  A local user with the CAP_NET_ADMIN
capability in any user or network namespace could exploit this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5717&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Budimir Markovic reported a heap out-of-bounds write vulnerability
in the Linux kernel&#39;s Performance Events system caused by improper
handling of event groups, which may result in denial of service or
privilege escalation. The default settings in Debian prevent
exploitation unless more permissive settings have been applied in
the kernel.perf_event_paranoid sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6606&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;j51569436&amp;quot; reported a potential out-of-bounds read in the CIFS
filesystem implementation.  If a CIFS filesystem is mounted from a
malicious server, the server could possibly exploit this to cause
a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6931&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Budimir Markovic reported a heap out-of-bounds write vulnerability
in the Linux kernel&#39;s Performance Events system which may result in
denial of service or privilege escalation. The default settings in
Debian prevent exploitation unless more permissive settings have
been applied in the kernel.perf_event_paranoid sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6932&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability in the IPv4 IGMP implementation may
result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25775&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ivan D Barrera, Christopher Bednarz, Mustafa Ismail and Shiraz
Saleem discovered that improper access control in the Intel Ethernet
Controller RDMA driver may result in privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34319&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ross Lagerwall discovered a buffer overrun in Xen&#39;s netback driver
which may allow a Xen guest to cause denial of service to the
virtualisation host by sending malformed packets.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34324&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Marek Marczykowski-Gorecki reported a possible deadlock in the Xen
guests event channel code which may allow a malicious guest
administrator to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35001&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tanguy DUBROCA discovered an out-of-bounds reads and write flaw in
the Netfilter nf_tables implementation when processing an
nft_byteorder expression, which may result in local privilege
escalation for a user with the CAP_NET_ADMIN capability in any
user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39189, CVE-2023-39192, CVE-2023-39193&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lucas Leong of Trend Micro Zero Day Initiative reported missing
bounds checks in the nfnetlink_osf, xt_u32, and xt_sctp netfilter
modules.  A local user with the CAP_NET_ADMIN capability in any
user or network namespace could exploit these to leak sensitive
information from the kernel or for denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39194&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lucas Leong of Trend Micro Zero Day Initiative reported a missing
bounds check in the xfrm (IPsec) subsystem.  A local user with the
CAP_NET_ADMIN capability in any user or network namespace could
exploit this to leak sensitive information from the kernel or for
denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-40283&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free was discovered in Bluetooth L2CAP socket
handling.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered an off-by-one error in the netfilter ipset
subsystem which could lead to out-of-bounds memory access.  A
local user with the CAP_NET_ADMIN capability in any user or
network namespace could exploit this to cause a denial of service
(memory corruption or crash) and possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42754&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered a flaw in the IPv4 implementation which could
lead to a null pointer deference.  A local user could exploit this
for denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42755&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered missing configuration validation in the
cls_rsvp network classifier which could lead to out-of-bounds
reads.  A local user with the CAP_NET_ADMIN capability in any user
or network namespace could exploit this to cause a denial of
service (crash) or to leak sensitive information.

This flaw has been mitigated by removing the cls_rsvp classifier.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45863&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition in library routines for handling generic kernel
objects may result in an out-of-bounds write in the
fill_kobj_path() function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45871&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Manfred Rudigier reported a flaw in the igb network driver for
Intel Gigabit Ethernet interfaces.  When the &amp;quot;rx-all&amp;quot; feature was
enabled on such a network interface, an attacker on the same
network segment could send packets that would overflow a receive
buffer, leading to a denial of service (crash or memory
corruption) or possibly remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51780&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the ATM (Asynchronous
Transfer Mode) subsystem may lead to a use-after-free.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51781&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the Appletalk subsystem
may lead to a use-after-free.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51782&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the Amateur Radio X.25
PLP (Rose) support may lead to a use-after-free. This module is not
auto-loaded on Debian systems, so this issue only affects systems
where it is explicitly loaded.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update additionally includes many more bug fixes
from stable updates 4.19.290-4.19.304 inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1033-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1033-1-linux-5.10/</link>
      <pubDate>Thu, 25 Jan 2024 11:26:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1033-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1033-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.205-2~deb8u1 (jessie), 5.10.205-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44879&#34;&gt;CVE-2021-44879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5178&#34;&gt;CVE-2023-5178&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5197&#34;&gt;CVE-2023-5197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5717&#34;&gt;CVE-2023-5717&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6121&#34;&gt;CVE-2023-6121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6531&#34;&gt;CVE-2023-6531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6817&#34;&gt;CVE-2023-6817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6931&#34;&gt;CVE-2023-6931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6932&#34;&gt;CVE-2023-6932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25775&#34;&gt;CVE-2023-25775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34324&#34;&gt;CVE-2023-34324&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35827&#34;&gt;CVE-2023-35827&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45863&#34;&gt;CVE-2023-45863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46813&#34;&gt;CVE-2023-46813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46862&#34;&gt;CVE-2023-46862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51780&#34;&gt;CVE-2023-51780&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51781&#34;&gt;CVE-2023-51781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-51782&#34;&gt;CVE-2023-51782&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-44879&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wenqing Liu reported a NULL pointer dereference in the f2fs
implementation. An attacker able to mount a specially crafted image
can take advantage of this flaw for denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5178&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Alon Zahavi reported a use-after-free flaw in the NVMe-oF/TCP
subsystem in the queue initialization setup, which may result in
denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5197&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kevin Rich discovered a use-after-free flaw in the netfilter
subsystem which may result in denial of service or privilege
escalation for a user with the CAP_NET_ADMIN capability in any user
or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5717&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Budimir Markovic reported a heap out-of-bounds write vulnerability
in the Linux kernel&#39;s Performance Events system caused by improper
handling of event groups, which may result in denial of service or
privilege escalation. The default settings in Debian prevent
exploitation unless more permissive settings have been applied in
the kernel.perf_event_paranoid sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6121&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Alon Zahavi reported an out-of-bounds read vulnerability in the
NVMe-oF/TCP which may result in an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6531&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered a use-after-free flaw due to a race condition
when the unix garbage collector&#39;s deletion of a SKB races
with unix_stream_read_generic() on the socket that the SKB is
queued on.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6817&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xingyuan Mo discovered that a use-after-free in Netfilter&#39;s
implementation of PIPAPO (PIle PAcket POlicies) may result in denial
of service or potential local privilege escalation for a user with
the CAP_NET_ADMIN capability in any user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6931&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Budimir Markovic reported a heap out-of-bounds write vulnerability
in the Linux kernel&#39;s Performance Events system which may result in
denial of service or privilege escalation. The default settings in
Debian prevent exploitation unless more permissive settings have
been applied in the kernel.perf_event_paranoid sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6932&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability in the IPv4 IGMP implementation may
result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25775&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ivan D Barrera, Christopher Bednarz, Mustafa Ismail and Shiraz
Saleem discovered that improper access control in the Intel Ethernet
Controller RDMA driver may result in privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34324&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Marek Marczykowski-Gorecki reported a possible deadlock in the Xen
guests event channel code which may allow a malicious guest
administrator to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35827&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a use-after-free flaw in the Renesas Ethernet
AVB support driver.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45863&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition in library routines for handling generic kernel
objects may result in an out-of-bounds write in the
fill_kobj_path() function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-46813&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tom Dohrmann reported that a race condition in the Secure Encrypted
Virtualization (SEV) implementation when accessing MMIO registers
may allow a local attacker in a SEV guest VM to cause a denial of
service or potentially execute arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-46862&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the io_uring
subsystem may result in a NULL pointer dereference, causing a
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51780&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the ATM (Asynchronous
Transfer Mode) subsystem may lead to a use-after-free.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51781&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the Appletalk subsystem
may lead to a use-after-free.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-51782&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a race condition in the Amateur Radio X.25
PLP (Rose) support may lead to a use-after-free. This module is not
auto-loaded on Debian systems, so this issue only affects systems
where it is explicitly loaded.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update additionally fixes Debian bugs
#1032104, #1035587, and #1052304; and includes many more bug fixes
from stable updates 5.10.198-5.10.205 inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1032-1 asterisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1032-1-asterisk/</link>
      <pubDate>Wed, 24 Jan 2024 20:02:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1032-1-asterisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1032-1-asterisk/">
      
&lt;p&gt;Package : asterisk&lt;/p&gt;


&lt;p&gt;Version : 1:13.14.1~dfsg-2&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37457&#34;&gt;CVE-2023-37457&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49294&#34;&gt;CVE-2023-49294&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were discovered in Asterisk, a private branch
exchange.&lt;/p&gt;
&lt;p&gt;CVE-2023-37457&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The &#39;update&#39; functionality of the PJSIP_HEADER dialplan function can exceed
the available buffer space for storing the new value of a header. By doing
so this can overwrite memory or cause a crash. This is not externally
exploitable, unless dialplan is explicitly written to update a header based
on data from an outside source. If the &#39;update&#39; functionality is not used
the vulnerability does not occur.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-49294&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It is possible to read any arbitrary file even when the `live_dangerously`
option is not enabled.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1031-1 xerces-c security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1031-1-xerces-c/</link>
      <pubDate>Sun, 21 Jan 2024 18:53:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1031-1-xerces-c/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1031-1-xerces-c/">
      
&lt;p&gt;Package : xerces-c&lt;/p&gt;


&lt;p&gt;Version : 3.1.1-5.1&amp;#43;deb8u6 (jessie), 3.1.4&amp;#43;debian-2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37536&#34;&gt;CVE-2023-37536&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Even Rouault discovered that xerces-c, a validating XML parser library
for C++, was vulnerable to integer overflow via crafted .xsd files,
which can lead to out-of-bounds access.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1030-1 freerdp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1030-1-freerdp/</link>
      <pubDate>Wed, 17 Jan 2024 11:04:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1030-1-freerdp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1030-1-freerdp/">
      
&lt;p&gt;Package : freerdp&lt;/p&gt;


&lt;p&gt;Version : 1.1.0~git20140921.1.440916e&amp;#43;dfsg1-13&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11524&#34;&gt;CVE-2020-11524&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39282&#34;&gt;CVE-2022-39282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39318&#34;&gt;CVE-2022-39318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39319&#34;&gt;CVE-2022-39319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39347&#34;&gt;CVE-2022-39347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41877&#34;&gt;CVE-2022-41877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39353&#34;&gt;CVE-2023-39353&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39354&#34;&gt;CVE-2023-39354&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39356&#34;&gt;CVE-2023-39356&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40188&#34;&gt;CVE-2023-40188&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been found in freerdp2, a free
implementation of the Remote Desktop Protocol (RDP). An attacker
(e.g. through a malicious RDP server) could launch DoS
(denial-of-service) attacks through multiple vectors typically
crashing the client, exploit buffer overflows that could lead to
command execution, or access files outside of a shared directory.&lt;/p&gt;
&lt;p&gt;This update also fixes two regressions related to the CVE-2020-11096
and CVE-2020-11089 fixes in ELA-717-1.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-11524&lt;/p&gt;
&lt;p&gt;libfreerdp/codec/interleaved.c has an Out-of-bounds Write.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39282&lt;/p&gt;
&lt;p&gt;FreeRDP based clients on unix systems using &lt;code&gt;/parallel&lt;/code&gt; command
line switch might read uninitialized data and send it to the
server the client is currently connected to.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39318&lt;/p&gt;
&lt;p&gt;Missing input validation in &lt;code&gt;urbdrc&lt;/code&gt; channel. A malicious server
can trick a FreeRDP based client to crash with division by zero.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39319&lt;/p&gt;
&lt;p&gt;Missing input length validation in the &lt;code&gt;urbdrc&lt;/code&gt; channel. A
malicious server can trick a FreeRDP based client to read out of
bound data and send it back to the server.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39347&lt;/p&gt;
&lt;p&gt;missing path canonicalization and base path check for &lt;code&gt;drive&lt;/code&gt;
channel. A malicious server can trick a FreeRDP based client to
read files outside the shared directory.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-41877&lt;/p&gt;
&lt;p&gt;Missing input length validation in &lt;code&gt;drive&lt;/code&gt; channel. A malicious
server can trick a FreeRDP based client to read out of bound data
and send it back to the server.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-39353&lt;/p&gt;
&lt;p&gt;Missing offset validation leading to Out Of Bound Read. In the
&lt;code&gt;libfreerdp/codec/rfx.c&lt;/code&gt; file there is no offset validation in
&lt;code&gt;tile-&amp;gt;quantIdxY&lt;/code&gt;, &lt;code&gt;tile-&amp;gt;quantIdxCb&lt;/code&gt;, and &lt;code&gt;tile-&amp;gt;quantIdxCr&lt;/code&gt;. As
a result crafted input can lead to an out of bounds read access
which in turn will cause a crash.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-39354&lt;/p&gt;
&lt;p&gt;Out-Of-Bounds Read in the &lt;code&gt;nsc_rle_decompress_data&lt;/code&gt; function. The
Out-Of-Bounds Read occurs because it processes &lt;code&gt;context-&amp;gt;Planes&lt;/code&gt;
without checking if it contains data of sufficient length. Should
an attacker be able to leverage this vulnerability they may be
able to cause a crash.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-39356&lt;/p&gt;
&lt;p&gt;Missing offset validation may lead to an Out Of Bound Read in the
function &lt;code&gt;gdi_multi_opaque_rect&lt;/code&gt;. In particular there is no code
to validate if the value &lt;code&gt;multi_opaque_rect-&amp;gt;numRectangles&lt;/code&gt; is
less than 45. Looping through &lt;code&gt;multi_opaque_rect-&amp;gt;&lt;/code&gt;numRectangles
without proper boundary checks can lead to Out-of-Bounds Read
errors which will likely lead to a crash.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-40188&lt;/p&gt;
&lt;p&gt;Out-Of-Bounds Read in the &lt;code&gt;nsc_rle_decode&lt;/code&gt; function. This
Out-Of-Bounds Read occurs because processing is done on the &lt;code&gt;in&lt;/code&gt;
variable without checking if it contains data of sufficient
length. Insufficient data for the &lt;code&gt;in&lt;/code&gt; variable may cause errors
or crashes.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1029-1 tinyxml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1029-1-tinyxml/</link>
      <pubDate>Tue, 16 Jan 2024 20:14:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1029-1-tinyxml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1029-1-tinyxml/">
      
&lt;p&gt;Package : tinyxml&lt;/p&gt;


&lt;p&gt;Version : 2.6.2-2&amp;#43;deb8u2 (jessie), 2.6.2-4&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34194&#34;&gt;CVE-2023-34194&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;TinyXML, a small and simple XML parser library, was vulnerable.
A specially crafted	XML document with a NUL character (&lt;kbd&gt;\0&lt;/kbd&gt;)
located after a whitespace character, could trigger a crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1028-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1028-1-tomcat8/</link>
      <pubDate>Thu, 04 Jan 2024 11:54:59 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1028-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1028-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.5.54-0&amp;#43;deb9u14 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46589&#34;&gt;CVE-2023-46589&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An improper input validation vulnerability was discovered in Apache Tomcat.
Tomcat did not correctly parse HTTP trailer headers.  A trailer header that
exceeded the header size limit could cause Tomcat to treat a single request as
multiple requests, leading to the possibility of request smuggling when behind
a reverse proxy.&lt;/p&gt;
&lt;p&gt;The update for Debian 8 &amp;ldquo;jessie&amp;rdquo; is pending.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1026-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1026-1-libreoffice/</link>
      <pubDate>Sun, 31 Dec 2023 10:21:47 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1026-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1026-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:4.3.3-2&amp;#43;deb8u15 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6185&#34;&gt;CVE-2023-6185&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An Improper Input Validation vulnerability
was found in GStreamer integration of The Document
Foundation LibreOffice allows an attacker to execute arbitrary
GStreamer plugins. In affected versions the filename of the
embedded video is not sufficiently escaped when passed to
GStreamer enabling an attacker to run arbitrary
gstreamer plugins depending on what plugins are installed
on the target system.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1027-1 libde265 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1027-1-libde265/</link>
      <pubDate>Sun, 31 Dec 2023 11:09:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1027-1-libde265/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1027-1-libde265/">
      
&lt;p&gt;Package : libde265&lt;/p&gt;


&lt;p&gt;Version : 1.0.11-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49465&#34;&gt;CVE-2023-49465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49467&#34;&gt;CVE-2023-49467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-49468&#34;&gt;CVE-2023-49468&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Three issues have been found in libde265, an open H.265 video codec
implementation. All issues are related to heap-buffer-overflow or global
buffer overflow in different functions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1025-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1025-1-libreoffice/</link>
      <pubDate>Sat, 30 Dec 2023 13:51:11 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1025-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1025-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3~deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12801&#34;&gt;CVE-2020-12801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12802&#34;&gt;CVE-2020-12802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12803&#34;&gt;CVE-2020-12803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6185&#34;&gt;CVE-2023-6185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6186&#34;&gt;CVE-2023-6186&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in LibreOffice an
office productivity software suite:&lt;/p&gt;
&lt;p&gt;CVE-2020-12801:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If LibreOffice has an encrypted document
open and crashes, that document is auto-saved encrypted.
On restart, LibreOffice offers to restore the document
and prompts for the password to decrypt it. If the recovery
is successful, and if the file format of the recovered document
was not LibreOffice&#39;s default ODF file format, then affected versions
of LibreOffice default that subsequent saves of the document
are unencrypted. This may lead to a user accidentally saving
a MSOffice file format document unencrypted while believing
it to be encrypted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12802:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LibreOffice has a &#39;stealth mode&#39; in which only
documents from locations deemed &#39;trusted&#39; are allowed to
retrieve remote resources. This mode is not the default mode,
but can be enabled by users who want to disable LibreOffice&#39;s ability
to include remote resources within a document. A flaw existed
where remote graphic links loaded from docx documents were omitted
from this protection.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12803:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ODF documents can contain forms to be
filled out by the user. Similar to HTML forms, the contained
form data can be submitted to a URI, for example, to an external
web server. To create submittable forms, ODF implements the
XForms W3C standard, which allows data to be submitted without
the need for macros or other active scripting. LibreOffice allowed
forms to be submitted to any URI, including file: URIs, enabling
form submissions to overwrite local files. User-interaction
is required to submit the form, but to avoid the possibility
of malicious documents engineered to maximize the possibility of
inadvertent user submission this feature has now been limited to
http[s] URIs, removing the possibility to overwrite local files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-6185&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Improper Input Validation vulnerability
was found in GStreamer integration of The Document
Foundation LibreOffice allows an attacker to execute arbitrary
GStreamer plugins. In affected versions the filename of the
embedded video is not sufficiently escaped when passed to
GStreamer enabling an attacker to run arbitrary
gstreamer plugins depending on what plugins are installed
on the target system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Fix CVE-2023-6186&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LibreOffice supports hyperlinks.
In addition to the typical common protocols such as
http/https hyperlinks can also have target URLs that
can launch built-in macros or dispatch built-in
internal commands. In affected version of LibreOffice
there are scenarios where these can be executed without warning
if the user activates such hyperlinks. In later versions
the users&#39;s explicit macro execution permissions
for the document are now consulted if these non-typical
hyperlinks can be executed. The possibility to use these
variants of hyperlink targets for floating frames has been removed.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1024-1 haproxy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1024-1-haproxy/</link>
      <pubDate>Sun, 24 Dec 2023 11:47:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1024-1-haproxy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1024-1-haproxy/">
      
&lt;p&gt;Package : haproxy&lt;/p&gt;


&lt;p&gt;Version : 1.5.8-3&amp;#43;deb8u4 (jessie), 1.7.5-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45539&#34;&gt;CVE-2023-45539&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential information disclosure vulnerability in HAProxy, a reverse proxy server used to load balance HTTP requests across multiple servers.&lt;/p&gt;
&lt;p&gt;HAProxy formerly accepted the # (ie. the &amp;ldquo;pound&amp;rdquo; or &amp;ldquo;hash&amp;rdquo;) symbol as part of a URI component. This might have allowed remote attackers to obtain sensitive information upon HAProxy&amp;rsquo;s misinterpretation of a path_end rule, such as by routing index.html#.png to a static server.&lt;/p&gt;
&lt;p&gt;CVE-2023-45539&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1023-1 bluez security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1023-1-bluez/</link>
      <pubDate>Wed, 20 Dec 2023 12:01:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1023-1-bluez/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1023-1-bluez/">
      
&lt;p&gt;Package : bluez&lt;/p&gt;


&lt;p&gt;Version : 5.43-2&amp;#43;deb9u2~deb8u6 (jessie), 5.43-2&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45866&#34;&gt;CVE-2023-45866&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a keyboard injection attack in Bluez, a set of
services and tools for interacting with wireless Bluetooth devices.&lt;/p&gt;
&lt;p&gt;Prior to this change, BlueZ may have permitted unauthenticated peripherals
to establish encrypted connections and thereby accept keyboard reports,
potentially permitting injection of HID (~keyboard) commands, despite no user
authorising such access.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1022-1 ncurses security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1022-1-ncurses/</link>
      <pubDate>Mon, 18 Dec 2023 15:29:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1022-1-ncurses/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1022-1-ncurses/">
      
&lt;p&gt;Package : ncurses&lt;/p&gt;


&lt;p&gt;Version : 5.9&amp;#43;20140913-1&amp;#43;deb8u6 (jessie), 6.0&amp;#43;20161126-1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29491&#34;&gt;CVE-2023-29491&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Loading of custom terminfo entries in setuid/setgid programs has been disabled to mitigate memory corruption via malformed data in terminfo database files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1019-2 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1019-2-xorg-server/</link>
      <pubDate>Sun, 17 Dec 2023 19:53:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1019-2-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1019-2-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u14 (jessie), 2:1.19.2-1&amp;#43;deb9u17 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6377&#34;&gt;CVE-2023-6377&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The initial fix for CVE-2023-6377 as applied in ELA 1019-1 did not fully
fix the vulnerability. Updated packages correcting this issue including
the upstream merged commit are now available.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1021-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1021-1-intel-microcode/</link>
      <pubDate>Sun, 17 Dec 2023 18:38:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1021-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1021-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20231114.1~deb8u1 (jessie), 3.20231114.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23583&#34;&gt;CVE-2023-23583&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa
Milburn, Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi,
Josh Eads, Salman Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela,
Doug Kwan, and Kostik Shtoyk discovered that some Intel processors
mishandle repeated sequences of instructions leading to unexpected
behavior, which may result in privilege escalation, information
disclosure or denial of service. This vulnerability is also known as
reptar and has been assigend CVE-2023-23583.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1020-1 tzdata security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1020-1-tzdata/</link>
      <pubDate>Fri, 15 Dec 2023 16:48:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1020-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1020-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u11 (jessie), 2021a-0&amp;#43;deb9u11 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the latest changes to the leap second list,
including an update to its expiry date, which was set for the end of
December.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1019-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1019-1-xorg-server/</link>
      <pubDate>Wed, 13 Dec 2023 12:05:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1019-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1019-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u13 (jessie), 2:1.19.2-1&amp;#43;deb9u16 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6377&#34;&gt;CVE-2023-6377&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-6478&#34;&gt;CVE-2023-6478&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server,
which may result in privilege escalation if the X server is running
privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1018-1 rabbitmq-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1018-1-rabbitmq-server/</link>
      <pubDate>Mon, 11 Dec 2023 12:44:16 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1018-1-rabbitmq-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1018-1-rabbitmq-server/">
      
&lt;p&gt;Package : rabbitmq-server&lt;/p&gt;


&lt;p&gt;Version : 3.6.6&amp;#43;really3.8.9-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46118&#34;&gt;CVE-2023-46118&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;RabbitMQ is a multi-protocol messaging and streaming broker. The HTTP API did
not enforce an HTTP request body limit, making it vulnerable for denial of
service (DoS) attacks with very large messages by an authenticated user with
sufficient credentials.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1017-1 opendkim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1017-1-opendkim/</link>
      <pubDate>Fri, 01 Dec 2023 19:48:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1017-1-opendkim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1017-1-opendkim/">
      
&lt;p&gt;Package : opendkim&lt;/p&gt;


&lt;p&gt;Version : 2.11.0~alpha-10&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48521&#34;&gt;CVE-2022-48521&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2022-48521:
An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through 2.11.0-Beta2. It fails to keep track of ordinal numbers when removing fake Authentication-Results header fields, which allows a remote attacker to craft an e-mail message with a fake sender address such that programs that rely on Authentication-Results from OpenDKIM will treat the message as having a valid DKIM signature when in fact it has none.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1016-1 vlc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1016-1-vlc/</link>
      <pubDate>Thu, 30 Nov 2023 23:52:01 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1016-1-vlc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1016-1-vlc/">
      
&lt;p&gt;Package : vlc&lt;/p&gt;


&lt;p&gt;Version : 3.0.20-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47359&#34;&gt;CVE-2023-47359&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47360&#34;&gt;CVE-2023-47360&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities in the MMS over HTTP protocol have been fixed in the
VLC media player, which has also been upgraded to the latest upstream version.&lt;/p&gt;
&lt;p&gt;CVE-2023-47359&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap buffer overflow in the MMSH module.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-47360&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer underflow in the MMSH module.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1015-1 gst-plugins-bad1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1015-1-gst-plugins-bad1.0/</link>
      <pubDate>Thu, 30 Nov 2023 23:35:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1015-1-gst-plugins-bad1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1015-1-gst-plugins-bad1.0/">
      
&lt;p&gt;Package : gst-plugins-bad1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2.1&amp;#43;deb8u7 (jessie), 1.10.4-1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44446&#34;&gt;CVE-2023-44446&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in gst-plugins-bad1.0, which contains several GStreamer plugins from the &amp;ldquo;bad&amp;rdquo; set.
The issue is related to use-after-free of some pointers within the MXF demuxer.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1013-1 zbar security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1013-1-zbar/</link>
      <pubDate>Thu, 30 Nov 2023 16:35:19 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1013-1-zbar/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1013-1-zbar/">
      
&lt;p&gt;Package : zbar&lt;/p&gt;


&lt;p&gt;Version : 0.10&amp;#43;doc-10.1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40889&#34;&gt;CVE-2023-40889&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Zbar, a barcode scanner application, was vulnerable. A heap-based buffer overflow existed
in the qr_reader_match_centers function.
Specially crafted QR codes may lead to information disclosure
and/or arbitrary code execution. To trigger this
vulnerability, an attacker can digitally input the
malicious QR code, or prepare it to be physically scanned
by the vulnerable scanner.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1014-1 python-urllib3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1014-1-python-urllib3/</link>
      <pubDate>Thu, 30 Nov 2023 16:24:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1014-1-python-urllib3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1014-1-python-urllib3/">
      
&lt;p&gt;Package : python-urllib3&lt;/p&gt;


&lt;p&gt;Version : 1.9.1-3&amp;#43;deb8u2 (jessie), 1.19.1-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20060&#34;&gt;CVE-2018-20060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25091&#34;&gt;CVE-2018-25091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43804&#34;&gt;CVE-2023-43804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45803&#34;&gt;CVE-2023-45803&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in python-urllib3, a user-friendly HTTP
library for Python.&lt;/p&gt;
&lt;h3 id=&#34;cve-2018-20060&#34;&gt;CVE-2018-20060&lt;/h3&gt;
&lt;p&gt;It was discovered that the Authorization HTTP header was not removed when
following a cross-origin redirect (i.e., a redirect that differs in host,
port, or scheme).  This could allow for credentials in the Authorization
header to be exposed to unintended hosts or transmitted in cleartext.&lt;/p&gt;
&lt;h3 id=&#34;cve-2018-25091&#34;&gt;CVE-2018-25091&lt;/h3&gt;
&lt;p&gt;Yoshida Katsuhiko discovered that the fix for CVE-2018-20060 did not cover
non-titlecase request headers; for instance “authorization” request headers
were not removed during cross-origin redirects.  (Per RFC7230 sec. 3.2
header fields are to be treated case-insensitively.)&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-43804&#34;&gt;CVE-2023-43804&lt;/h3&gt;
&lt;p&gt;It was discovered that the Cookie request header was not stripped during
cross-origin redirects.  It is therefore possible for a user specifying a
Cookie header to unknowingly leak information via HTTP redirects to a
different origin, unless the user disables redirects explicitly.
The issue is similar to CVE-2018-20060, but for the Cookie request header rather
than Authorization.&lt;/p&gt;
&lt;h3 id=&#34;cve-2023-45803&#34;&gt;CVE-2023-45803&lt;/h3&gt;
&lt;p&gt;It was discovered that the HTTP request body was not removed when an HTTP
redirect response using status 301, 302, or 303 after the request had its
method changed from one that could accept a request body, like POST, to GET,
as required by the HTTP RFCs.  This could lead to information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1012-1 strongswan security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1012-1-strongswan/</link>
      <pubDate>Wed, 29 Nov 2023 12:57:37 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1012-1-strongswan/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1012-1-strongswan/">
      
&lt;p&gt;Package : strongswan&lt;/p&gt;


&lt;p&gt;Version : 5.2.1-6&amp;#43;deb8u11 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41913&#34;&gt;CVE-2023-41913&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential buffer overflow in &lt;code&gt;strongswan&lt;/code&gt;, a
popular IPsec-based VPN (Virtual Private Network) server.&lt;/p&gt;
&lt;p&gt;A vulnerability related to processing public Diffie-Hellman key exchange values
could have resulted in a buffer overflow and potentially remote code execution
as a consequence.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1011-1 freeimage security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1011-1-freeimage/</link>
      <pubDate>Tue, 28 Nov 2023 07:14:06 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1011-1-freeimage/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1011-1-freeimage/">
      
&lt;p&gt;Package : freeimage&lt;/p&gt;


&lt;p&gt;Version : 3.17.0&amp;#43;ds1-5&amp;#43;deb9u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21427&#34;&gt;CVE-2020-21427&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22524&#34;&gt;CVE-2020-22524&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in freeimage, library for graphics
image formats.&lt;/p&gt;
&lt;p&gt;CVE-2020-21427&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow vulnerability in function LoadPixelDataRLE8
in PluginBMP.cpp allows remote attackers to run arbitrary code and cause
other impacts via crafted image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-22524&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow vulnerability in FreeImage_Load function
allows remote attackers to run arbitrary code and cause other
impacts via crafted PFM file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1010-1 minizip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1010-1-minizip/</link>
      <pubDate>Mon, 27 Nov 2023 23:35:50 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1010-1-minizip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1010-1-minizip/">
      
&lt;p&gt;Package : minizip&lt;/p&gt;


&lt;p&gt;Version : 1.1-8&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45853&#34;&gt;CVE-2023-45853&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in minizip, a compression library.
When using long filenames, an integer overflow might happen, which results in a heap-based buffer overflow in zipOpenNewFileInZip4_64().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1009-1 symfony security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1009-1-symfony/</link>
      <pubDate>Mon, 27 Nov 2023 20:05:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1009-1-symfony/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1009-1-symfony/">
      
&lt;p&gt;Package : symfony&lt;/p&gt;


&lt;p&gt;Version : 2.8.7&amp;#43;dfsg-1.3&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-46734&#34;&gt;CVE-2023-46734&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Pierre Rudloff discovered a potential XSS vulnerability in Symfony, a PHP
framework. Some Twig filters in CodeExtension use &lt;code&gt;is_safe=html&lt;/code&gt; but do not
actually ensure their input is safe. Symfony now escapes the output of the
affected filters.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1008-1 audiofile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1008-1-audiofile/</link>
      <pubDate>Mon, 27 Nov 2023 19:52:54 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1008-1-audiofile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1008-1-audiofile/">
      
&lt;p&gt;Package : audiofile&lt;/p&gt;


&lt;p&gt;Version : 0.3.6-4&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13147&#34;&gt;CVE-2019-13147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24599&#34;&gt;CVE-2022-24599&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The audiofile library allows the processing of audio data to and from audio
files of many common formats (currently AIFF, AIFF-C, WAVE, NeXT/Sun, BICS, and
raw data).&lt;/p&gt;
&lt;p&gt;CVE-2019-13147&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Audiofile was vulnerable due to an integer overflow. The program quits
early if NeXT audio files include too many channels now.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24599&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak was found due to reading a not null terminated copyright field.
Preallocate zeroed memory and always NUL terminate C strings from now on.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1007-1 amanda security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1007-1-amanda/</link>
      <pubDate>Mon, 27 Nov 2023 19:06:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1007-1-amanda/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1007-1-amanda/">
      
&lt;p&gt;Package : amanda&lt;/p&gt;


&lt;p&gt;Version : 1:3.3.9-5&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37703&#34;&gt;CVE-2022-37703&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37705&#34;&gt;CVE-2022-37705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-30577&#34;&gt;CVE-2023-30577&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties have been found in Amanda, a backup system designed to archive many computers on a
network to a single large-capacity tape drive. The vulnerabilties potentially allow local privilege escalation
from the backup user to root or allow leaking information whether a directory exists in the filesystem.&lt;/p&gt;
&lt;p&gt;CVE-2022-37703&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUID binary. An attacker can abuse this vulnerability to know if a directory exists or not anywhere in the fs. The binary will use `opendir()` as root directly without checking the path, letting the attacker provide an arbitrary path.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-37705&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-30577&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The SUID binary &amp;quot;runtar&amp;quot; can accept the possibly malicious GNU tar options if fed with some non-argument option starting with &amp;quot;--exclude&amp;quot; (say --exclude-vcs). The following option will be accepted as &amp;quot;good&amp;quot; and it could be an option passing some script/binary that would be executed with root permissions.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1006-1 libde265 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1006-1-libde265/</link>
      <pubDate>Sun, 26 Nov 2023 13:49:50 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1006-1-libde265/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1006-1-libde265/">
      
&lt;p&gt;Package : libde265&lt;/p&gt;


&lt;p&gt;Version : 1.0.11-0&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43887&#34;&gt;CVE-2023-43887&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libde265, an open H.265 video codec implementation.
It is related to a buffer over read in pic_parameter_set::dump, which might result in an information leak or denial of service with crafted H.265 files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1005-1 gimp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1005-1-gimp/</link>
      <pubDate>Tue, 21 Nov 2023 17:17:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1005-1-gimp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1005-1-gimp/">
      
&lt;p&gt;Package : gimp&lt;/p&gt;


&lt;p&gt;Version : 2.8.18-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30067&#34;&gt;CVE-2022-30067&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44442&#34;&gt;CVE-2023-44442&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44444&#34;&gt;CVE-2023-44444&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in GIMP,
the GNU Image Manipulation Program.&lt;/p&gt;
&lt;p&gt;CVE-2022-30067&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-memory with crafted XCF file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-44442&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PSD file parsing buffer overflow.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-44444&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PSP file parsing buffer overflow.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1004-1 libde265 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1004-1-libde265/</link>
      <pubDate>Mon, 20 Nov 2023 13:36:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1004-1-libde265/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1004-1-libde265/">
      
&lt;p&gt;Package : libde265&lt;/p&gt;


&lt;p&gt;Version : 1.0.11-0&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27102&#34;&gt;CVE-2023-27102&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27103&#34;&gt;CVE-2023-27103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-47471&#34;&gt;CVE-2023-47471&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in libde265, an open H.265 video codec implementation.
They are related to segmentation faults and buffer overflows in different functions, which might result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1003-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1003-1-postgresql-9.4/</link>
      <pubDate>Sun, 19 Nov 2023 11:41:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1003-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1003-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u8 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5869&#34;&gt;CVE-2023-5869&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39417&#34;&gt;CVE-2023-39417&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in PostgreSQL, an advanced
open source database.&lt;/p&gt;
&lt;p&gt;CVE-2023-5869&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;While modifying certain SQL array values, missing overflow checks let
authenticated database users write arbitrary bytes to a memory area that
facilitates arbitrary code execution. Missing overflow checks also let
authenticated database users read a wide area of server memory. The
CVE-2021-32027 fix covered some attacks of this description, but it missed
others.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39417&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the EXTENSION SCRIPT, a SQL Injection vulnerability was found in
PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a
quoting construct (dollar quoting, &#39;&#39;, or &amp;quot;&amp;quot;). If an administrator has
installed files of a vulnerable, trusted, non-bundled extension, an
attacker with database-level CREATE privilege can execute arbitrary code as
the bootstrap superuser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1002-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1002-1-vim/</link>
      <pubDate>Sat, 18 Nov 2023 23:52:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1002-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1002-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u11 (jessie), 2:8.0.0197-4&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4752&#34;&gt;CVE-2023-4752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4781&#34;&gt;CVE-2023-4781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5344&#34;&gt;CVE-2023-5344&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in the editor vim.&lt;/p&gt;
&lt;p&gt;CVE-2023-4752
Heap use after free in ins_compl_get_exp()&lt;/p&gt;
&lt;p&gt;CVE-2023-4781
Heap buffer-overflow in vim_regsub_both()&lt;/p&gt;
&lt;p&gt;CVE-2023-5344
Heap buffer-overflow in trunc_string()&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1000-1 ceph security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1000-1-ceph/</link>
      <pubDate>Thu, 16 Nov 2023 12:00:58 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1000-1-ceph/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1000-1-ceph/">
      
&lt;p&gt;Package : ceph&lt;/p&gt;


&lt;p&gt;Version : 0.80.7-2&amp;#43;deb8u6 (jessie), 10.2.11-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43040&#34;&gt;CVE-2023-43040&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in Ceph RGW component. An unprivileged user can write to any bucket(s) accessible by a given key if a POST&amp;rsquo;s form-data contains a key called &amp;ldquo;bucket&amp;rdquo; with a value matching the name of the bucket used to sign the request. The result of this is that a user could actually upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in said POST form part.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1001-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1001-1-postgresql-9.6/</link>
      <pubDate>Thu, 16 Nov 2023 00:38:29 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1001-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1001-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5868&#34;&gt;CVE-2023-5868&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5869&#34;&gt;CVE-2023-5869&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5870&#34;&gt;CVE-2023-5870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-39417&#34;&gt;CVE-2023-39417&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in PostgreSQL, an advanced
open source database.&lt;/p&gt;
&lt;p&gt;CVE-2023-5868&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Certain aggregate function calls receiving &amp;quot;unknown&amp;quot;-type arguments could
disclose bytes of server memory from the end of the &amp;quot;unknown&amp;quot;-type value to
the next zero byte. One typically gets an &amp;quot;unknown&amp;quot;-type value via a string
literal having no type designation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5869&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;While modifying certain SQL array values, missing overflow checks let
authenticated database users write arbitrary bytes to a memory area that
facilitates arbitrary code execution. Missing overflow checks also let
authenticated database users read a wide area of server memory. The
CVE-2021-32027 fix covered some attacks of this description, but it missed
others.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-5870&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Documentation says the pg_signal_backend role cannot signal &amp;quot;a backend
owned by a superuser&amp;quot;. On the contrary, it can signal background workers,
including the logical replication launcher. It can signal autovacuum
workers and the autovacuum launcher. Signaling autovacuum workers and those
two launchers provides no meaningful exploit, so exploiting this
vulnerability requires a non-core extension with a less-resilient
background worker. For example, a non-core background worker that does not
auto-restart would experience a denial of service with respect to that
particular background worker.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-39417&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the EXTENSION SCRIPT, a SQL Injection vulnerability was found in
PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a
quoting construct (dollar quoting, &#39;&#39;, or &amp;quot;&amp;quot;). If an administrator has
installed files of a vulnerable, trusted, non-bundled extension, an
attacker with database-level CREATE privilege can execute arbitrary code as
the bootstrap superuser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-999-1 open-vm-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-999-1-open-vm-tools/</link>
      <pubDate>Tue, 14 Nov 2023 19:49:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-999-1-open-vm-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-999-1-open-vm-tools/">
      
&lt;p&gt;Package : open-vm-tools&lt;/p&gt;


&lt;p&gt;Version : 10.1.5-5055683-4&amp;#43;deb9u6 (jessie), 2:10.1.5-5055683-4&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34058&#34;&gt;CVE-2023-34058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34059&#34;&gt;CVE-2023-34059&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Open Virtual Machine Tools (open-vm-tools) project is an open source
implementation of VMware Tools. It is a suite of virtualization utilities and
drivers to improve the functionality, user experience and administration of
VMware virtual machines.&lt;/p&gt;
&lt;p&gt;CVE-2023-34058:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A file descriptor hijack vulnerability was found in the `vmware-user-suid-wrapper`
command. A malicious actor with non-root privileges might have been able
to hijack the `block` file descriptor. Compared to the most recent upstream version,
the `uinput` file descriptor hijack vulnerability was not present (this file descriptor
was added latter for supporting Wayland).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34059:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A SAML Token Signature Bypass vulnerability was found in VGAUTH component.
A malicious actor that has been granted Guest Operation Privileges
in a target virtual machine might have been able to
elevate their privileges if that target
virtual machine has been assigned a more privileged Guest Alias.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update fixes CVE-2023-34058 and CVE-2023-34059 for Stretch, but fixes only
CVE-2023-34058 for Jessie. Indeed, the vulnerable code (VGAUTH component) was introduced
later in upstream version 9.10.0, and thus Jessie was not vulnerable to the attack exposed
in CVE-2023-34059.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-998-1 batik security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-998-1-batik/</link>
      <pubDate>Sun, 05 Nov 2023 17:14:28 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-998-1-batik/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-998-1-batik/">
      
&lt;p&gt;Package : batik&lt;/p&gt;


&lt;p&gt;Version : 1.7&amp;#43;dfsg-5&amp;#43;deb8u4 (jessie), 1.8-4&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11987&#34;&gt;CVE-2020-11987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38398&#34;&gt;CVE-2022-38398&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38648&#34;&gt;CVE-2022-38648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40146&#34;&gt;CVE-2022-40146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44729&#34;&gt;CVE-2022-44729&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44730&#34;&gt;CVE-2022-44730&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Batik is a toolkit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format for various purposes, such as viewing, generation or manipulation. Various Server-Side Request Forgery (SSRF) vulnerabilities were fixed.&lt;/p&gt;
&lt;p&gt;CVE-2020-11987&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A server-side request forgery was found, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38398&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) vulnerability was found that allows an attacker to load a URL thru the JAR protocol.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38648&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) vulnerability was found that allows an attacker to fetch external resources.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-40146&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) vulnerability was found that allows an attacker to access files using a JAR type URL.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44729&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) vulnerability was found. A malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44730&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Server-Side Request Forgery (SSRF) vulnerability was found. A malicious SVG can probe user profile / data and send it directly as parameter to a URL.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-997-1 python3.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-997-1-python3.5/</link>
      <pubDate>Fri, 03 Nov 2023 08:48:21 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-997-1-python3.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-997-1-python3.5/">
      
&lt;p&gt;Package : python3.5&lt;/p&gt;


&lt;p&gt;Version : 3.5.3-1&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3177&#34;&gt;CVE-2021-3177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48560&#34;&gt;CVE-2022-48560&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48564&#34;&gt;CVE-2022-48564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48565&#34;&gt;CVE-2022-48565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48566&#34;&gt;CVE-2022-48566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40217&#34;&gt;CVE-2023-40217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in python3.5, an interactive high-level
object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2021-3177:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A regression was fixed in CVE-2021-3177: ISO C90 forbids mixed
declarations and code, that could lead to compilation errors in
some contexts.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48560:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free existed in Python via heappushpop function
in heapq.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48564:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A DoS attack via CPU and RAM exhaustion
when processing malformed Apple Property List files
in binary format was fixed. This needed a backport of GH-4455.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48565:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An XML External Entity (XXE) issue
was discovered in Python. The plistlib module no longer
accepts entity declarations in XML plist files to
avoid XML vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48566:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in compare_digest
in Lib/hmac.py in Python. Constant-time-defeating
optimisations were possible in the accumulator variable
in hmac.compare_digest, that would facilitate a side
channel type attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-40217:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was fixed in TLS handling.
If a TLS server-side socket is created, receives data
into the socket buffer, and then is closed quickly,
there is a brief window where the SSLSocket instance
will detect the socket as &amp;quot;not connected&amp;quot; and
won&#39;t initiate a handshake, but buffered data will
still be readable from the socket buffer.
This data will not be authenticated if the server-side
TLS peer is expecting client certificate authentication,
and is indistinguishable from valid TLS stream data.
Data is limited in size to the amount that will fit in the buffer.
The TLS connection cannot directly be used for data
exfiltration because the vulnerable code path requires
that the connection be closed on initialization of the SSLSocket.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-996-1 request-tracker4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-996-1-request-tracker4/</link>
      <pubDate>Thu, 02 Nov 2023 11:11:55 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-996-1-request-tracker4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-996-1-request-tracker4/">
      
&lt;p&gt;Package : request-tracker4&lt;/p&gt;


&lt;p&gt;Version : 4.4.1-3&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41259&#34;&gt;CVE-2023-41259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41260&#34;&gt;CVE-2023-41260&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system.&lt;/p&gt;
&lt;p&gt;CVE-2023-41259&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tom Wolters reported that Request Tracker is vulnerable to accepting
unvalidated RT email headers in incoming email and the mail-gateway REST
interface.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-41260&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tom Wolters reported that Request Tracker is vulnerable to information
leakage via response messages returned from requests sent via the
mail-gateway REST interface
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Even if these issues have been fixed, it is strongly recommended to ensure
that &lt;code&gt;.../REST/1.0/NoAuth&lt;/code&gt; is only accessible for host(s) that run &lt;code&gt;rt-mailgate&lt;/code&gt;
for submitting email to RT.  This is often the system which has
request-tracker4 installed. The sample configurations supplied by these
packages for Apache2 and Nginx restrict access to localhost only.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-995-1 distro-info test-suite update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-995-1-distro-info/</link>
      <pubDate>Mon, 30 Oct 2023 15:26:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-995-1-distro-info/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-995-1-distro-info/">
      
&lt;p&gt;Package : distro-info&lt;/p&gt;


&lt;p&gt;Version : 0.14&amp;#43;deb8u1 (jessie), 0.14&amp;#43;deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;This is a non-security update, enabling distro-info to continue to build
with the distro-info-data update in ELA-994-1, which broke some
test-suite assumptions.&lt;/p&gt;
&lt;p&gt;This update also allows distro-info to support additional columns in
distro-info-data, easing future updates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-994-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-994-1-distro-info-data/</link>
      <pubDate>Mon, 30 Oct 2023 15:25:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-994-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-994-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.36~bpo8&amp;#43;4 (jessie), 0.41&amp;#43;deb10u2~bpo9&amp;#43;4 (stretch)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian LTS
users.&lt;/p&gt;
&lt;p&gt;It includes Ubuntu 24.10, and makes some minor updates to older EoL
dates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-993-1 gst-plugins-bad1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-993-1-gst-plugins-bad1.0/</link>
      <pubDate>Sat, 28 Oct 2023 18:52:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-993-1-gst-plugins-bad1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-993-1-gst-plugins-bad1.0/">
      
&lt;p&gt;Package : gst-plugins-bad1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2.1&amp;#43;deb8u6 (jessie), 1.10.4-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40474&#34;&gt;CVE-2023-40474&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40475&#34;&gt;CVE-2023-40475&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40476&#34;&gt;CVE-2023-40476&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework and its codecs and demuxers, which may result in denial
of service or potentially the execution of arbitrary code if a malformed
media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-992-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-992-1-openjdk-8/</link>
      <pubDate>Fri, 27 Oct 2023 08:41:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-992-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-992-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u392-ga-1~deb8u1 (jessie), 8u392-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22067&#34;&gt;CVE-2023-22067&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22081&#34;&gt;CVE-2023-22081&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in authentication bypass, information disclosure or denial
of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-991-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-991-1-linux-5.10/</link>
      <pubDate>Thu, 26 Oct 2023 10:08:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-991-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-991-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.197-1~deb8u1 (jessie), 5.10.197-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4269&#34;&gt;CVE-2022-4269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39189&#34;&gt;CVE-2022-39189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1206&#34;&gt;CVE-2023-1206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1380&#34;&gt;CVE-2023-1380&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2002&#34;&gt;CVE-2023-2002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2007&#34;&gt;CVE-2023-2007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2124&#34;&gt;CVE-2023-2124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2269&#34;&gt;CVE-2023-2269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2898&#34;&gt;CVE-2023-2898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3090&#34;&gt;CVE-2023-3090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3111&#34;&gt;CVE-2023-3111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3141&#34;&gt;CVE-2023-3141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3212&#34;&gt;CVE-2023-3212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3268&#34;&gt;CVE-2023-3268&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3338&#34;&gt;CVE-2023-3338&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3389&#34;&gt;CVE-2023-3389&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3609&#34;&gt;CVE-2023-3609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3611&#34;&gt;CVE-2023-3611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3772&#34;&gt;CVE-2023-3772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3773&#34;&gt;CVE-2023-3773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3776&#34;&gt;CVE-2023-3776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3863&#34;&gt;CVE-2023-3863&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4004&#34;&gt;CVE-2023-4004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4128&#34;&gt;CVE-2023-4128&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4132&#34;&gt;CVE-2023-4132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4147&#34;&gt;CVE-2023-4147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4194&#34;&gt;CVE-2023-4194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4244&#34;&gt;CVE-2023-4244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4273&#34;&gt;CVE-2023-4273&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4622&#34;&gt;CVE-2023-4622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4623&#34;&gt;CVE-2023-4623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4921&#34;&gt;CVE-2023-4921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20588&#34;&gt;CVE-2023-20588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21255&#34;&gt;CVE-2023-21255&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21400&#34;&gt;CVE-2023-21400&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31084&#34;&gt;CVE-2023-31084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34256&#34;&gt;CVE-2023-34256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34319&#34;&gt;CVE-2023-34319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35788&#34;&gt;CVE-2023-35788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35823&#34;&gt;CVE-2023-35823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35824&#34;&gt;CVE-2023-35824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40283&#34;&gt;CVE-2023-40283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42753&#34;&gt;CVE-2023-42753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42755&#34;&gt;CVE-2023-42755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42756&#34;&gt;CVE-2023-42756&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2022-4269&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;William Zhao discovered that a flaw in the Traffic Control (TC)
subsystem when using a specific networking configuration
(redirecting egress packets to ingress using TC action &amp;quot;mirred&amp;quot;),
may allow a local unprivileged user to cause a denial of service
(triggering a CPU soft lockup).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39189&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered that TLB flush operations are mishandled in
the KVM subsystem in certain KVM_VCPU_PREEMPTED situations, which
may allow an unprivileged guest user to compromise the guest
kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1206&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the networking stack permits attackers to
force hash collisions in the IPv6 connection lookup table, which
may result in denial of service (significant increase in the cost
of lookups, increased CPU utilization).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1380&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jisoo Jang reported a heap out-of-bounds read in the brcmfmac
Wi-Fi driver. On systems using this driver, a local user could
exploit this to read sensitive information or to cause a denial of
service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2002&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ruiahn Li reported an incorrect permissions check in the Bluetooth
subsystem. A local user could exploit this to reconfigure local
Bluetooth interfaces, resulting in information leaks, spoofing, or
denial of service (loss of connection).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2007&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lucas Leong and Reno Robert discovered a
time-of-check-to-time-of-use flaw in the dpt_i2o SCSI controller
driver. A local user with access to a SCSI device using this
driver could exploit this for privilege escalation.

This flaw has been mitigated by removing support for the I2OUSRCMD
operation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2124&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing
metadata validation may result in denial of service or potential
privilege escalation if a corrupted XFS disk image is mounted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2269&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Zhang reported that improper handling of locking in the
device mapper implementation may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2898&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that missing sanitising in the f2fs file system
may result in denial of service if a malformed file system is
accessed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3090&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that missing initialization in ipvlan networking
may lead to an out-of-bounds write vulnerability, resulting in
denial of service or potentially the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3111&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The TOTE Robot tool found a flaw in the Btrfs filesystem driver
that can lead to a use-after-free. It&#39;s unclear whether an
unprivileged user can exploit this.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3141&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the r592 memstick driver that could lead
to a use-after-free after the driver is removed or unbound from a
device. The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3212&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yang Lan discovered that missing validation in the GFS2 filesystem
could result in denial of service via a NULL pointer dereference
when mounting a malformed GFS2 filesystem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3268&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that an out-of-bounds memory access in relayfs
could result in denial of service or an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3338&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Davide Ornaghi discovered a flaw in the DECnet protocol
implementation which could lead to a null pointer dereference or
use-after-free. A local user can exploit this to cause a denial of
service (crash or memory corruption) and probably for privilege
escalation.

This flaw has been mitigated by removing the DECnet protocol
implementation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3389&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Querijn Voet discovered a use-after-free in the io_uring
subsystem, which may result in denial of service or privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3609, CVE-2023-3776. CVE-2023-4128&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a use-after-free in the cls_fw, cls_u32,
cls_route and network classifiers may result in denial of service
or potential local privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3611&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that an out-of-bounds write in the traffic
control subsystem for the Quick Fair Queueing scheduler (QFQ) may
result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3772&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lin Ma discovered a NULL pointer dereference flaw in the XFRM
subsystem which may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3773&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lin Ma discovered a flaw in the XFRM subsystem, which may result
in denial of service for a user with the CAP_NET_ADMIN capability
in any user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3863&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a use-after-free in the NFC implementation
may result in denial of service, an information leak or potential
local privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4004&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a use-after-free in Netfilter&#39;s
implementation of PIPAPO (PIle PAcket POlicies) may result in
denial of service or potential local privilege escalation for a
user with the CAP_NET_ADMIN capability in any user or network
namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4132&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in the driver for Siano SMS1xxx based MDTV
receivers may result in local denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4147&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kevin Rich discovered a use-after-free in Netfilter when adding a
rule with NFTA_RULE_CHAIN_ID, which may result in local privilege
escalation for a user with the CAP_NET_ADMIN capability in any
user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4194&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A type confusion in the implementation of TUN/TAP network devices
may allow a local user to bypass network filters.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4244&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was found in the nftables subsystem that could
lead to a use-after-free.  A local user could exploit this to
cause a denial of service (crash), information leak, or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4273&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Maxim Suhanov discovered a stack overflow in the exFAT driver,
which may result in local denial of service via a malformed file
system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4622&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Bing-Jhong Billy Jheng discovered a use-after-free within the Unix
domain sockets component, which may result in local privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4623&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Budimir Markovic reported a missing configuration check in the
sch_hfsc network scheduler that could lead to a use-after-free or
other problems.  A local user with the CAP_NET_ADMIN capability in
any user or network namespace could exploit this to cause a denial
of service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-4921&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;valis&amp;quot; reported flaws in the sch_qfq network scheduler that could
lead to a use-after-free.  A local user with the CAP_NET_ADMIN
capability in any user or network namespace could exploit this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-20588&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Koepf and
Oleksii Oleksenko discovered that on some AMD CPUs with the Zen1
micro architecture an integer division by zero may leave stale
quotient data from a previous division, resulting in a potential
leak of sensitive data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-21255&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free was discovered in the Android binder driver,
which may result in local privilege escalation on systems where
the binder driver is loaded.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-21400&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ye Zhang and Nicolas Wu discovered a double-free in the io_uring
subsystem, which may result in denial of service or privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31084&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the DVB Core driver does not properly
handle locking of certain events, allowing a local user to cause a
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34256&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a time-of-check-to-time-of-use flaw in the
ext4 filesystem driver. An attacker able to mount a disk image or
device that they can also write to directly could exploit this to
cause an out-of-bounds read, possibly resulting in a leak of
sensitive information or denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34319&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ross Lagerwall discovered a buffer overrun in Xen&#39;s netback driver
which may allow a Xen guest to cause denial of service to the
virtualisation host by sending malformed packets.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35788&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hangyu Hua discovered that an off-by-one in the Flower traffic
classifier may result in local denial of service or the execution
of privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35823&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the saa7134 media driver that could lead
to a use-after-free after the driver is removed or unbound from a
device. The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35824&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the dm1105 media driver that could lead
to a use-after-free after the driver is removed or unbound from a
device. The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-40283&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free was discovered in Bluetooth L2CAP socket
handling.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered an off-by-one error in the netfilter ipset
subsystem which could lead to out-of-bounds memory access.  A
local user with the CAP_NET_ADMIN capability in any user or
network namespace could exploit this to cause a denial of service
(memory corruption or crash) and possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42755&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered missing configuration validation in the
cls_rsvp network classifier which could lead to out-of-bounds
reads.  A local user with the CAP_NET_ADMIN capability in any user
or network namespace could exploit this to cause a denial of
service (crash) or to leak sensitive information.

This flaw has been mitigated by removing the cls_rsvp classifier.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-42756&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered a race condition in the netfiler ipset
subsystem which could lead to an assertion failure.  A local user
with the CAP_NET_ADMIN capability in any user or network namespace
could exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update additionally fixes Debian bugs
#871216, #1035359, #1036543, #1044518, and #1050622; and includes many
more bug fixes from stable updates 5.10.180-5.10.197 inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-990-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-990-1-xorg-server/</link>
      <pubDate>Wed, 25 Oct 2023 17:42:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-990-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-990-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u12 (jessie), 2:1.19.2-1&amp;#43;deb9u15 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5367&#34;&gt;CVE-2023-5367&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5380&#34;&gt;CVE-2023-5380&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered several vulnerabilities in the Xorg X server,
which may result in privilege escalation if the X server is running
privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-989-1 dbus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-989-1-dbus/</link>
      <pubDate>Mon, 23 Oct 2023 15:56:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-989-1-dbus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-989-1-dbus/">
      
&lt;p&gt;Package : dbus&lt;/p&gt;


&lt;p&gt;Version : 1.10.32-0&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34969&#34;&gt;CVE-2023-34969&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that D-Bus, a simple interprocess messaging system, was
susceptible to a denial of service vulnerability if a monitor was being
run.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-988-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-988-1-redis/</link>
      <pubDate>Mon, 23 Oct 2023 13:49:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-988-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-988-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u12 (jessie), 3:3.2.6-3&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45145&#34;&gt;CVE-2023-45145&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an authentication bypass vulnerability in
Redis, a popular key-value database similar to memcached.&lt;/p&gt;
&lt;p&gt;On startup, Redis began listening on a Unix socket before adjusting its
permissions to the user-provided configuration. If a permissive &lt;code&gt;umask(2)&lt;/code&gt; was
used, this created a race condition that enabled, during a short period of
time, another process to establish an otherwise unauthorized connection.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-987-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-987-1-krb5/</link>
      <pubDate>Mon, 23 Oct 2023 14:27:02 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-987-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-987-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-19&amp;#43;deb8u8 (jessie), 1.15-1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36054&#34;&gt;CVE-2023-36054&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Potential freeing of an uninitialized pointer in kadm_rpc_xdr.c
was fixed in krb5, the MIT implementation of the Kerberos network
authentication protocol.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-957-2 zabbix regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-957-2-zabbix/</link>
      <pubDate>Sat, 21 Oct 2023 12:29:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-957-2-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-957-2-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u6 (jessie), 1:3.0.32&amp;#43;dfsg-0&amp;#43;deb9u5 (stretch)&lt;/p&gt;


      &lt;p&gt;The last update required an update to the database scheme, but as
zabbix does not support upgrading the database scheme if SQlite3 is used,
using zabbix-proxy-sqlite3 requires the user to drop the database and recreate
it with a supplied sql template file.&lt;/p&gt;
&lt;p&gt;However, this template file has not been updated in the previous upload,
making this recreation difficult when not knowing the details.&lt;/p&gt;
&lt;p&gt;Please read /usr/share/doc/zabbix-proxy-sqlite3/README.Debian for instructions
how to create the database file.&lt;/p&gt;
&lt;p&gt;Note: All other database backends will automatically update the schema.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-985-2 tomcat8 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-985-2-tomcat8/</link>
      <pubDate>Tue, 17 Oct 2023 00:25:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-985-2-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-985-2-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.5.54-0&amp;#43;deb9u13 (stretch)&lt;/p&gt;


      &lt;p&gt;A regression was discovered in the Http2UpgradeHandler class of Tomcat 8
introduced by the patch to fix CVE-2023-44487 (Rapid Reset Attack). A wrong
value for the overheadcount variable forced HTTP2 connections to close early.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-986-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-986-1-tomcat7/</link>
      <pubDate>Mon, 16 Oct 2023 13:44:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-986-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-986-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u5 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42795&#34;&gt;CVE-2023-42795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45648&#34;&gt;CVE-2023-45648&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been discovered in the Tomcat servlet and JSP
engine.&lt;/p&gt;
&lt;p&gt;CVE-2023-42795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Information Disclosure. When recycling various internal objects, including
the request and the response, prior to re-use by the next request/response,
an error could cause Tomcat to skip some parts of the recycling process
leading to information leaking from the current request/response to the
next.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45648&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A
specially crafted, invalid trailer header could cause Tomcat to treat a
single request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-985-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-985-1-tomcat8/</link>
      <pubDate>Mon, 16 Oct 2023 00:14:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-985-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-985-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u27 (jessie), 8.5.54-0&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42795&#34;&gt;CVE-2023-42795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-45648&#34;&gt;CVE-2023-45648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44487&#34;&gt;CVE-2023-44487&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2023-42795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Information Disclosure. When recycling various internal objects, including
the request and the response, prior to re-use by the next request/response,
an error could cause Tomcat to skip some parts of the recycling process
leading to information leaking from the current request/response to the
next.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-44487&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;DoS caused by HTTP/2 frame overhead (Rapid Reset Attack).
Only Tomcat 8 in Debian 9 &amp;quot;Stretch&amp;quot; was affected.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-45648&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A
specially crafted, invalid trailer header could cause Tomcat to treat a
single request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-984-1 nghttp2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-984-1-nghttp2/</link>
      <pubDate>Sun, 15 Oct 2023 15:20:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-984-1-nghttp2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-984-1-nghttp2/">
      
&lt;p&gt;Package : nghttp2&lt;/p&gt;


&lt;p&gt;Version : 1.18.1-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44487&#34;&gt;CVE-2023-44487&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2023-44487 describes a flaw in the HTTP2 protocol that allows an attacker to rapidly create and cancel streams by sending a HEADERS frame
immediately followed by a RST_STREAM. This can cause a denial of service due to resource exhaustion.&lt;/p&gt;
&lt;p&gt;The applied patches mitigate this flaw by rate limiting the cancellation of streams and disconnecting the client when this limit is exceeded.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-983-1 python-reportlab security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-983-1-python-reportlab/</link>
      <pubDate>Sun, 15 Oct 2023 11:46:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-983-1-python-reportlab/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-983-1-python-reportlab/">
      
&lt;p&gt;Package : python-reportlab&lt;/p&gt;


&lt;p&gt;Version : 3.3.0-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19450&#34;&gt;CVE-2019-19450&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28463&#34;&gt;CVE-2020-28463&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities were found in python-reportlab, a Python library for creating
PDF documents.&lt;/p&gt;
&lt;h3 id=&#34;cve-2019-19450&#34;&gt;CVE-2019-19450&lt;/h3&gt;
&lt;p&gt;The &lt;code&gt;start_unichar&lt;/code&gt; function in paraparser.py was found to evaluate untrusted
user input, which could permit remote code execution.&lt;/p&gt;
&lt;h3 id=&#34;cve-2020-28463&#34;&gt;CVE-2020-28463&lt;/h3&gt;
&lt;p&gt;It was discovered that img tags could be used for Server-side Request Forgery
(SSRF).  The issue can be mitigated by using the new &lt;code&gt;trustedSchemes&lt;/code&gt; and
&lt;code&gt;trustedHosts&lt;/code&gt; rl_config variables.  See &amp;ldquo;Inline Images&amp;rdquo; in ch. 6 of the
reportlab user manual.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-982-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-982-1-curl/</link>
      <pubDate>Wed, 11 Oct 2023 13:51:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-982-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-982-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u27 (jessie), 7.52.1-5&amp;#43;deb9u20 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38546&#34;&gt;CVE-2023-38546&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue was found in Curl, an easy-to-use client-side URL transfer library
and command line tool, which could lead to cookie injection from a file
named &lt;code&gt;none&lt;/code&gt; under certain circumstances.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-981-1 firmware-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-981-1-firmware-nonfree/</link>
      <pubDate>Sun, 08 Oct 2023 13:04:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-981-1-firmware-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-981-1-firmware-nonfree/">
      
&lt;p&gt;Package : firmware-nonfree&lt;/p&gt;


&lt;p&gt;Version : 20190114&amp;#43;really20220913-0&amp;#43;deb8u2 (jessie), 20190114&amp;#43;really20220913-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27635&#34;&gt;CVE-2022-27635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36351&#34;&gt;CVE-2022-36351&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38076&#34;&gt;CVE-2022-38076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40964&#34;&gt;CVE-2022-40964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46329&#34;&gt;CVE-2022-46329&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Intel® released the INTEL-SA-00766 advisory about potential security
vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products
may allow escalation of privilege or denial of service. The full advisory is
available at [1]&lt;/p&gt;
&lt;p&gt;[1] &lt;a href=&#34;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html&#34;&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This updated firmware-nonfree package includes the following firmware files:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intel Bluetooth AX2xx series:
&lt;ul&gt;
&lt;li&gt;ibt-0041-0041.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-0-0.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-0-1.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-0-4.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-16-4.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-240-1.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-240-4.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-32-0.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-32-1.sfi&lt;/li&gt;
&lt;li&gt;ibt-19-32-4.sfi&lt;/li&gt;
&lt;li&gt;ibt-20-0-3.sfi&lt;/li&gt;
&lt;li&gt;ibt-20-1-3.sfi&lt;/li&gt;
&lt;li&gt;ibt-20-1-4.sfi&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Intel Wireless 22000 series
&lt;ul&gt;
&lt;li&gt;iwlwifi-Qu-b0-hr-b0-77.ucode&lt;/li&gt;
&lt;li&gt;iwlwifi-Qu-b0-jf-b0-77.ucode&lt;/li&gt;
&lt;li&gt;iwlwifi-Qu-c0-hr-b0-77.ucode&lt;/li&gt;
&lt;li&gt;iwlwifi-Qu-c0-jf-b0-77.ucode&lt;/li&gt;
&lt;li&gt;iwlwifi-QuZ-a0-hr-b0-77.ucode&lt;/li&gt;
&lt;li&gt;iwlwifi-cc-a0-77.ucode&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The updated firmware files might need updated kernel to work. It is encouraged
to verify whether the kernel loaded the updated firmware file and take
additional measures if needed.&lt;/p&gt;
&lt;p&gt;CVE-2022-27635&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow a privileged user to potentially enable escalation of
privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36351&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow an unauthenticated user to potentially enable denial of
service via adjacent access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38076&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow an authenticated user to potentially enable escalation
of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-40964&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow a privileged user to potentially enable escalation of
privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-46329&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software
may allow a privileged user to potentially enable escalation of privilege via
local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-980-1 libxpm security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-980-1-libxpm/</link>
      <pubDate>Thu, 05 Oct 2023 13:11:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-980-1-libxpm/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-980-1-libxpm/">
      
&lt;p&gt;Package : libxpm&lt;/p&gt;


&lt;p&gt;Version : 1:3.5.12-0&amp;#43;deb8u3 (jessie), 1:3.5.12-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43786&#34;&gt;CVE-2023-43786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43787&#34;&gt;CVE-2023-43787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43788&#34;&gt;CVE-2023-43788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43789&#34;&gt;CVE-2023-43789&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were found in libXpm, the X Pixmap (XPM) image
library.&lt;/p&gt;
&lt;p&gt;CVE-2023-43786&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yair Mizrahi discovered an infinite recursion issue when parsing
crafted XPM files, which would result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43787&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yair Mizrahi discovered a buffer overflow vulnerability in libX11
when parsing crafted XPM files, which could result in denial of
service or potentially the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43788&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Alan Coopersmith found an out of bounds read in
XpmCreateXpmImageFromBuffer, which could result in denial of
service when parsing crafted XPM files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43789&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Alan Coopersmith discovered an out of bounds read issue when
parsing corrupted colormaps, which could lead to denial of
service when parsing crafted XPM files.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-979-1 libx11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-979-1-libx11/</link>
      <pubDate>Thu, 05 Oct 2023 12:50:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-979-1-libx11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-979-1-libx11/">
      
&lt;p&gt;Package : libx11&lt;/p&gt;


&lt;p&gt;Version : 2:1.6.2-3&amp;#43;deb8u7 (jessie), 2:1.6.4-3&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43785&#34;&gt;CVE-2023-43785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43786&#34;&gt;CVE-2023-43786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-43787&#34;&gt;CVE-2023-43787&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were found in libx11, the X11 client-side
library.&lt;/p&gt;
&lt;p&gt;CVE-2023-43785&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gregory James Duck discovered an out of bounds memory access in
_XkbReadKeySyms, which could result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43786&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yair Mizrahi found an infinite recursion in PutSubImage when
parsing a crafted file, which would result in stack exhaustion
and denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-43787&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yair Mizrahi discovered an integer overflow in XCreateImage
when parsing crafted input, which would result in a small buffer
allocation leading into a buffer overflow. This could result
in denial of service or potentially in arbitrary code execution.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-978-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-978-1-cups/</link>
      <pubDate>Tue, 03 Oct 2023 10:32:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-978-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-978-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.7.5-11&amp;#43;deb8u12 (jessie), 2.2.1-8&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4504&#34;&gt;CVE-2023-4504&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32360&#34;&gt;CVE-2023-32360&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in cups, the Common UNIX Printing System(tm).&lt;/p&gt;
&lt;p&gt;CVE-2023-4504&lt;/p&gt;
&lt;p&gt;Due to missing boundary checks a heap-based buffer overflow and code
execution might be possible by using crafted postscript documents.&lt;/p&gt;
&lt;p&gt;CVE-2023-32360&lt;/p&gt;
&lt;p&gt;Unauthorized users might be allowed to fetch recently printed documents.&lt;/p&gt;
&lt;p&gt;Since this is a configuration fix, it might be that it does not reach
you if you are updating the package.
Please double check your /etc/cups/cupsd.conf file, whether it limits
the access to CUPS-Get-Document with something like the following&lt;/p&gt;
&lt;blockquote&gt;
 &lt;Limit CUPS-Get-Document&gt;
   AuthType Default
   Require user @OWNER @SYSTEM
   Order deny,allow
  &lt;/Limit&gt;
&lt;/blockquote&gt;
&lt;p&gt;(The important line is the &amp;lsquo;AuthType Default&amp;rsquo; in this section)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-977-1 libraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-977-1-libraw/</link>
      <pubDate>Tue, 03 Oct 2023 08:57:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-977-1-libraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-977-1-libraw/">
      
&lt;p&gt;Package : libraw&lt;/p&gt;


&lt;p&gt;Version : 0.17.2-6&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22628&#34;&gt;CVE-2020-22628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32142&#34;&gt;CVE-2021-32142&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two buffer overflow vulnerabilities were found in libraw, a raw image
decoder library, which could lead to denial of service via application
crash or potentially other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-976-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-976-1-exim4/</link>
      <pubDate>Tue, 03 Oct 2023 01:08:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-976-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-976-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.84.2-2&amp;#43;deb8u11 (jessie), 4.89-2&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42114&#34;&gt;CVE-2023-42114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-42116&#34;&gt;CVE-2023-42116&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in Exim, a mail transport agent,
which could result in remote code execution if the SPA/NTLM authenticators
are used.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-975-1 libvpx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-975-1-libvpx/</link>
      <pubDate>Mon, 02 Oct 2023 13:17:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-975-1-libvpx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-975-1-libvpx/">
      
&lt;p&gt;Package : libvpx&lt;/p&gt;


&lt;p&gt;Version : 1.6.1-3&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-44488&#34;&gt;CVE-2023-44488&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow vulnerability was found in libvpx, a multimedia
library for the VP8 and VP9 video codecs, which could result in the
execution of arbitrary code if a specially crafted VP9 media stream
is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-974-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-974-1-ghostscript/</link>
      <pubDate>Sat, 30 Sep 2023 22:58:01 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-974-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-974-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u12 (jessie), 9.26a~dfsg-0&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21710&#34;&gt;CVE-2020-21710&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21890&#34;&gt;CVE-2020-21890&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38559&#34;&gt;CVE-2023-38559&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2020-21710&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Divide by zero in eps_print_page()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21890&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in clj_media_size()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38559&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in devn_pcx_write_rle()
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-973-1 libvpx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-973-1-libvpx/</link>
      <pubDate>Sat, 30 Sep 2023 20:56:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-973-1-libvpx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-973-1-libvpx/">
      
&lt;p&gt;Package : libvpx&lt;/p&gt;


&lt;p&gt;Version : 1.3.0-3&amp;#43;deb8u4 (jessie), 1.6.1-3&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-5217&#34;&gt;CVE-2023-5217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Clement Lecigne discovered a heap-based buffer overflow in libvpx, a
multimedia library for the VP8 and VP9 video codecs, which may result in
the execution of arbitrary code if a specially crafted VP8 media stream
is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-972-1 exempi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-972-1-exempi/</link>
      <pubDate>Sat, 30 Sep 2023 21:35:20 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-972-1-exempi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-972-1-exempi/">
      
&lt;p&gt;Package : exempi&lt;/p&gt;


&lt;p&gt;Version : 2.4.1-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-18651&#34;&gt;CVE-2020-18651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-18652&#34;&gt;CVE-2020-18652&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Buffer overflows were fixed in the functions ID3_Support::ID3v2Frame::getFrameValue()
and WEBP_Support::VP8XChunk::VP8XChunk() of Exempi, an implementation of XMP (Extensible Metadata Platform).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-942-2 qpdf regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-942-2-qpdf/</link>
      <pubDate>Sat, 30 Sep 2023 15:08:14 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-942-2-qpdf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-942-2-qpdf/">
      
&lt;p&gt;Package : qpdf&lt;/p&gt;


&lt;p&gt;Version : 6.0.0-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


      &lt;p&gt;Two patches were dropped that caused compatibility issues after backport,
reopening the following CVEs:
CVE-2015-9252, CVE-2017-9209, CVE-2017-11625, CVE-2017-11627&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-971-1 libwebp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-971-1-libwebp/</link>
      <pubDate>Fri, 29 Sep 2023 21:41:17 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-971-1-libwebp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-971-1-libwebp/">
      
&lt;p&gt;Package : libwebp&lt;/p&gt;


&lt;p&gt;Version : 0.5.2-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4863&#34;&gt;CVE-2023-4863&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow in parsing WebP images may result in the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-970-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-970-1-libreoffice/</link>
      <pubDate>Fri, 29 Sep 2023 19:10:07 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-970-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-970-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:4.3.3-2&amp;#43;deb8u14 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0950&#34;&gt;CVE-2023-0950&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An abitrary code execution vulnerability was found in LibreOffice, an office
productivity software suite.&lt;/p&gt;
&lt;p&gt;CVE-2023-0950&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; An improper Validation of Array Index
 vulnerability was present in the spreadsheet component of
 LibreOffice. This allows an attacker to craft a spreadsheet
 document that will cause an array index underflow when loaded.
 In the affected versions of LibreOffice certain malformed
 spreadsheet formulas, such as AGGREGATE, could be created
 with less parameters passed to the formula interpreter than
 it expected, leading to an array index underflow,
 in which case there is a risk that arbitrary code could be executed
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Unfortunately the changes required to fix the remaining issues affecting
LibreOffice in Debian jessie are too invasive to be backported. Those
issues affect only the use of LibreOffice via its Graphical User Interface
(GUI). Users of LibreOffice needing the GUI are encouraged to migrate
to Debian stretch or newer. From this point onwards the GUI components
of LibreOffice are no longer supported in Debian jessie. Headless
LibreOffice will continue to be supported.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-969-1 graphicsmagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-969-1-graphicsmagick/</link>
      <pubDate>Fri, 29 Sep 2023 12:57:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-969-1-graphicsmagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-969-1-graphicsmagick/">
      
&lt;p&gt;Package : graphicsmagick&lt;/p&gt;


&lt;p&gt;Version : 1.3.30&amp;#43;hg15796-1~deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21679&#34;&gt;CVE-2020-21679&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that a buffer overflow in GraphicsMagick, a collection
of image processing tools, could result in denial of service or potentially
in the execution of arbitrary code when converting crafted images to the PCX
format.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-968-1 libreoffice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-968-1-libreoffice/</link>
      <pubDate>Thu, 28 Sep 2023 16:25:40 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-968-1-libreoffice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-968-1-libreoffice/">
      
&lt;p&gt;Package : libreoffice&lt;/p&gt;


&lt;p&gt;Version : 1:6.1.5-3~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25636&#34;&gt;CVE-2021-25636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3140&#34;&gt;CVE-2022-3140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26305&#34;&gt;CVE-2022-26305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26306&#34;&gt;CVE-2022-26306&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26307&#34;&gt;CVE-2022-26307&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38745&#34;&gt;CVE-2022-38745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0950&#34;&gt;CVE-2023-0950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2255&#34;&gt;CVE-2023-2255&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in LibreOffice, an office productivity software suite, leading to arbitrary script execution, improper certificate validation, and weak encryption of password storage in the user&amp;rsquo;s configuration database.&lt;/p&gt;
&lt;p&gt;The changes required to fix all the open vulnerabilities, especially
those affecting the Graphical User Interface (GUI), were too invasive to
be backported individually, and the risk of regressions was too high,
due to large amounts of source code that needed to be
modified or rewritten, including an internal library.&lt;/p&gt;
&lt;p&gt;A risk analysis was carried out, and it was determined that the best
available solution was to backport the buster version of LibreOffice to
stretch. This decision means that upon installing this update users of
LibreOffice in stretch will be moving from a LibreOffice version of 5.x
to 6.1.5. Additionally, this backport required the introduction of libxmlsec1
as new dependency.&lt;/p&gt;
&lt;p&gt;CVE-2021-25636&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Only use X509Data LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both &amp;quot;X509Data&amp;quot; and &amp;quot;KeyValue&amp;quot; children of the &amp;quot;KeyInfo&amp;quot; tag, which when opened caused LibreOffice to verify using the &amp;quot;KeyValue&amp;quot; but to report verification with the unrelated &amp;quot;X509Data&amp;quot; value.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3140&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient validation of &amp;quot;vnd.libreoffice.command&amp;quot; URI schemes. LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme &amp;quot;vnd.libreoffice.command&amp;quot; specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26305&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Compare authors using Thumbprint An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26306&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user&#39;s configuration data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26307&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Add Initialization Vectors to password storage. LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38745&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libreoffice may be configured to add an empty entry to the Java class path. This may lead to run arbitrary Java code from the current directory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0950&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Validation of Array Index vulnerability in the spreadsheet component allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2255&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper access control in editor components of LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used &amp;quot;floating frames&amp;quot; linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-967-1 ncurses security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-967-1-ncurses/</link>
      <pubDate>Thu, 28 Sep 2023 14:48:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-967-1-ncurses/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-967-1-ncurses/">
      
&lt;p&gt;Package : ncurses&lt;/p&gt;


&lt;p&gt;Version : 5.9&amp;#43;20140913-1&amp;#43;deb8u5 (jessie), 6.0&amp;#43;20161126-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-19189&#34;&gt;CVE-2020-19189&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out-of-bounds read problem was found in the postprocess_terminfo function
of ncurses, a text-based user interface toolkit, which could potentially lead
to an exposure of sensitive information or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-966-1 openssl1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-966-1-openssl1.0/</link>
      <pubDate>Tue, 26 Sep 2023 23:36:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-966-1-openssl1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-966-1-openssl1.0/">
      
&lt;p&gt;Package : openssl1.0&lt;/p&gt;


&lt;p&gt;Version : 1.0.2u-1~deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3446&#34;&gt;CVE-2023-3446&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3817&#34;&gt;CVE-2023-3817&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been discovered in openssl, a Secure Sockets Layer toolkit.
Excessively long DH key or parameter checks can cause significant delays
in applications using DH_check(), DH_check_ex(), or EVP_PKEY_param_check()
functions, potentially leading to Denial of Service attacks when keys or
parameters are obtained from untrusted sources.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-964-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-964-1-glib2.0/</link>
      <pubDate>Mon, 25 Sep 2023 17:05:47 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-964-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-964-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.42.1-1&amp;#43;deb8u6 (jessie), 2.50.3-2&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29499&#34;&gt;CVE-2023-29499&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32611&#34;&gt;CVE-2023-32611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32665&#34;&gt;CVE-2023-32665&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found in GLib, a general-purpose utility
library, used by projects such as GTK+, GIMP, and GNOME.&lt;/p&gt;
&lt;p&gt;CVE-2023-29499&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GVariant deserialization fails to validate that the input conforms to the
expected format, leading to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32611&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GVariant deserialization is vulnerable to a slowdown issue where a crafted
GVariant can cause excessive processing, leading to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32665&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GVariant deserialization is vulnerable to an exponential blowup issue where
a crafted GVariant can cause excessive processing, leading to denial of
service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-965-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-965-1-tomcat7/</link>
      <pubDate>Mon, 25 Sep 2023 21:54:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-965-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-965-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u4 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24998&#34;&gt;CVE-2023-24998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41080&#34;&gt;CVE-2023-41080&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were discovered in Apache Tomcat, a servlet and
JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2023-24998&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload to
provide the file upload functionality defined in the Jakarta Servlet
specification. Apache Tomcat was, therefore, also vulnerable to the Apache
Commons FileUpload vulnerability CVE-2023-24998 as there was no limit to
the number of request parts processed. This resulted in the possibility of
an attacker triggering a DoS with a malicious upload or series of uploads.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-41080&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If the ROOT (default) web application is configured to use FORM
authentication then it is possible that a specially crafted URL could be
used to trigger a redirect to an URL of the attacker&#39;s choice.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-963-1 plexus-utils2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-963-1-plexus-utils2/</link>
      <pubDate>Mon, 25 Sep 2023 17:48:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-963-1-plexus-utils2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-963-1-plexus-utils2/">
      
&lt;p&gt;Package : plexus-utils2&lt;/p&gt;


&lt;p&gt;Version : 3.0.15-1&amp;#43;deb8u2 (jessie), 3.0.22-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4244&#34;&gt;CVE-2022-4244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4245&#34;&gt;CVE-2022-4245&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been found in plexus-utils2, a collection of
components used by Apache Maven.&lt;/p&gt;
&lt;p&gt;CVE-2022-4244&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Directory Traversal issue was discovered in plexus-utils2. This is an
attack which aims to access files and directories that are stored outside
the intended folder. By manipulating files with &amp;quot;dot-dot-slash (../)&amp;quot;
sequences and its variations, or by using absolute file paths, it may be
possible to access arbitrary files and directories stored on the file system,
including application source code, configuration, and other critical system
files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4245&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to
sanitize comments for a --&amp;gt; sequence. This issue means that text contained
in the command string could be interpreted as XML and allow for XML
injection.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-962-1 elfutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-962-1-elfutils/</link>
      <pubDate>Mon, 25 Sep 2023 16:37:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-962-1-elfutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-962-1-elfutils/">
      
&lt;p&gt;Package : elfutils&lt;/p&gt;


&lt;p&gt;Version : 0.159-4.2&amp;#43;deb8u2 (jessie), 0.168-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21047&#34;&gt;CVE-2020-21047&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in elfutils, a collection of utilities to handle ELF objects.
Due to missing bound checks and reachable asserts, an attacker can use crafted elf files
to trigger application crashes that result in denial-of-services.&lt;/p&gt;
&lt;p&gt;As part of this update, CVE-2019-7149 has been fixed as well in Stretch.
Due to a heap-buffer-overflow problem in function read_srclines() a crafted ELF input can cause segmentation faults.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-961-1 linux-5.10 new linux version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-961-1-linux-5.10/</link>
      <pubDate>Mon, 25 Sep 2023 09:39:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-961-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-961-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.179-5~deb8u1 (jessie)&lt;/p&gt;


      &lt;p&gt;This update introduces Linux kernel 4.19 to Debian 8 jessie. Linux kernel 4.19 is still supported. Instructions on how to
update to 5.10 can be found &lt;a href=&#34;https://www.freexian.com/docs/kernel-backport&#34;&gt;in the kernel backports page&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-960-1 libapache-mod-jk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-960-1-libapache-mod-jk/</link>
      <pubDate>Sun, 24 Sep 2023 21:18:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-960-1-libapache-mod-jk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-960-1-libapache-mod-jk/">
      
&lt;p&gt;Package : libapache-mod-jk&lt;/p&gt;


&lt;p&gt;Version : 1:1.2.46-0&amp;#43;deb8u2 (jessie), 1:1.2.46-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41081&#34;&gt;CVE-2023-41081&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The mod_jk component of Apache Tomcat Connectors, an Apache 2 module to forward
requests from Apache to Tomcat, in some circumstances, such as when a
configuration included &amp;ldquo;JkOptions +ForwardDirectories&amp;rdquo; but the configuration
did not provide explicit mounts for all possible proxied requests, mod_jk would
use an implicit mapping and map the request to the first defined worker. Such
an implicit mapping could result in the unintended exposure of the status
worker and/or bypass security constraints configured in httpd. As of this
security update, the implicit mapping functionality has been removed and all
mappings must now be via explicit configuration. This issue affects Apache
Tomcat Connectors (mod_jk only).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-959-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-959-1-tomcat8/</link>
      <pubDate>Sun, 24 Sep 2023 17:45:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-959-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-959-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u26 (jessie), 8.5.54-0&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24998&#34;&gt;CVE-2023-24998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41080&#34;&gt;CVE-2023-41080&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were discovered in Apache Tomcat, a servlet and
JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2023-24998&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache Tomcat uses a packaged renamed copy of Apache Commons FileUpload to
provide the file upload functionality defined in the Jakarta Servlet
specification. Apache Tomcat was, therefore, also vulnerable to the Apache
Commons FileUpload vulnerability CVE-2023-24998 as there was no limit to
the number of request parts processed. This resulted in the possibility of
an attacker triggering a DoS with a malicious upload or series of uploads.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-41080&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If the ROOT (default) web application is configured to use FORM
authentication then it is possible that a specially crafted URL could be
used to trigger a redirect to an URL of the attacker&#39;s choice.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-958-1 lldpd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-958-1-lldpd/</link>
      <pubDate>Sat, 23 Sep 2023 23:57:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-958-1-lldpd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-958-1-lldpd/">
      
&lt;p&gt;Package : lldpd&lt;/p&gt;


&lt;p&gt;Version : 0.9.6-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41910&#34;&gt;CVE-2023-41910&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Matteo Memelli discovered a flaw in lldpd, an implementation of the IEEE
802.1ab protocol. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES
TLVs, a malicious actor can remotely force the lldpd daemon to perform an
out-of-bounds read on heap memory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-957-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-957-1-zabbix/</link>
      <pubDate>Sat, 23 Sep 2023 19:13:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-957-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-957-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u5 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-7484&#34;&gt;CVE-2013-7484&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17382&#34;&gt;CVE-2019-17382&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43515&#34;&gt;CVE-2022-43515&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29450&#34;&gt;CVE-2023-29450&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29451&#34;&gt;CVE-2023-29451&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29454&#34;&gt;CVE-2023-29454&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29455&#34;&gt;CVE-2023-29455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29456&#34;&gt;CVE-2023-29456&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29457&#34;&gt;CVE-2023-29457&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a network
monitoring solution, potentially allowing to crash the server, information
disclosure or Cross-Site-Scripting attacks.&lt;/p&gt;
&lt;p&gt;Important Notices:
To mitigate CVE-2019-17382, on existing installations, the guest account
needs to be manually disabled, for example by disabling the the &amp;ldquo;Guest
group&amp;rdquo; in the UI:
Administration -&amp;gt; User groups -&amp;gt; Guests -&amp;gt; Untick Enabled&lt;/p&gt;
&lt;p&gt;CVE-2013-7484&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix before version 4.4.0alpha2 stores credentials in the &amp;quot;users&amp;quot;
table with the password hash stored as a MD5 hash, which is a known
insecure hashing method. Furthermore, no salt is used with the hash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17382 (Disputed, not considered by upstream to be a security issue)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in
zabbix.php?action=dashboard.view&amp;amp;dashboardid=1 in Zabbix through
4.4. An attacker can bypass the login page and access the dashboard
page, and then create a Dashboard, Report, Screen, or Map without
any Username/Password (i.e., anonymously). All created elements
(Dashboard/Report/Screen/Map) are accessible by other users and by
an admin.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43515&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix Frontend provides a feature that allows admins to
maintain the installation and ensure that only certain IP addresses
can access it. In this way, any user will not be able to access the
Zabbix Frontend while it is being maintained and possible sensitive
data will be prevented from being disclosed. An attacker can bypass
this protection and access the instance using IP address not listed
in the defined range.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29450&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;JavaScript pre-processing can be used by the attacker to gain
access to the file system (read-only access on behalf of user
&amp;quot;zabbix&amp;quot;) on the Zabbix Server or Zabbix Proxy, potentially leading
to unauthorized access to sensitive data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29451&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Specially crafted string can cause a buffer overrun in the JSON
parser library leading to a crash of the Zabbix Server or a Zabbix
Proxy.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29454&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Stored or persistent cross-site scripting (XSS) vulnerability
was found on “Users” section in “Media” tab in “Send to” form field.
When new media is created with malicious code included into field
“Send to” then it will execute when editing the same media.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note: This issue was accidentially not mentioned in the debian changelog.&lt;/p&gt;
&lt;p&gt;CVE-2023-29455&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Reflected XSS attacks, also known as non-persistent attacks, was
found where an attacker can pass malicious code as GET request to
graph.php and system will save it and will execute when current
graph page is opened.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29456&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;URL validation scheme receives input from a user and then parses
it to identify its various components. The validation scheme can
ensure that all URL components comply with internet standards.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29457&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Reflected XSS attacks, also known as non-persistent attacks, was
found where XSS session cookies could be revealed, enabling a
perpetrator to impersonate valid users and abuse their private
accounts.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-956-1 libssh2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-956-1-libssh2/</link>
      <pubDate>Sat, 23 Sep 2023 16:10:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-956-1-libssh2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-956-1-libssh2/">
      
&lt;p&gt;Package : libssh2&lt;/p&gt;


&lt;p&gt;Version : 1.4.3-4.1&amp;#43;deb8u7 (jessie), 1.7.0-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22218&#34;&gt;CVE-2020-22218&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libssh2, an SSH2 client-side library, in function _libssh2_packet_add(), which could allow attackers to access out of bounds memory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-955-1 open-vm-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-955-1-open-vm-tools/</link>
      <pubDate>Fri, 22 Sep 2023 19:49:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-955-1-open-vm-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-955-1-open-vm-tools/">
      
&lt;p&gt;Package : open-vm-tools&lt;/p&gt;


&lt;p&gt;Version : 2:10.1.5-5055683-4&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20900&#34;&gt;CVE-2023-20900&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A security vulnerability was found in the Open VMware Tools. A malicious actor
that has been granted Guest Operation Privileges in a target virtual machine
may be able to elevate their privileges if that target virtual machine has
been assigned a more privileged Guest Alias.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-642-2 java-common regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-642-2-java-common/</link>
      <pubDate>Fri, 22 Sep 2023 13:35:47 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-642-2-java-common/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-642-2-java-common/">
      
&lt;p&gt;Package : java-common&lt;/p&gt;


&lt;p&gt;Version : 0.52&amp;#43;deb8u2 (jessie)&lt;/p&gt;


      &lt;p&gt;The java-common update of ELA-642-1 introduced a bug in
&lt;code&gt;/usr/share/java/java_defaults.mk&lt;/code&gt;, that made several actually supported
architectures were not included in the &lt;code&gt;java_architectures&lt;/code&gt; variable.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-954-1 flac security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-954-1-flac/</link>
      <pubDate>Fri, 22 Sep 2023 12:52:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-954-1-flac/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-954-1-flac/">
      
&lt;p&gt;Package : flac&lt;/p&gt;


&lt;p&gt;Version : 1.3.0-3&amp;#43;deb8u3 (jessie), 1.3.2-2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22219&#34;&gt;CVE-2020-22219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow was discovered in flac, a library handling Free
Lossless Audio Codec media, which could potentially result in the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-953-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-953-1-openssl/</link>
      <pubDate>Fri, 22 Sep 2023 10:01:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-953-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-953-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u21 (jessie), 1.1.0l-1~deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0464&#34;&gt;CVE-2023-0464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0465&#34;&gt;CVE-2023-0465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0466&#34;&gt;CVE-2023-0466&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2650&#34;&gt;CVE-2023-2650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3446&#34;&gt;CVE-2023-3446&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2023-0464&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin reported a flaw related to the verification of X.509
certificate chains that include policy constraints, which may result
in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0465&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin reported that invalid certificate policies in leaf
certificates are silently ignored. A malicious CA could take
advantage of this flaw to deliberately assert invalid certificate
policies in order to circumvent policy checking on the certificate
altogether.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0466&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin discovered that the implementation of the
X509_VERIFY_PARAM_add0_policy() function does not enable the check
which allows certificates with invalid or incorrect policies to pass
the certificate verification (contrary to its documentation).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2650&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that processing malformed ASN.1 object identifiers
or data may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3446&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was found that checking excessively long DH keys or parameters
could lead to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In addition, the stretch update addresses the following issues:&lt;/p&gt;
&lt;p&gt;CVE-2022-4304&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A timing based side channel attack was found on the RSA decryption
implementation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3817&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was found that checking excessively long DH keys or parameters
could lead to denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-952-1 gsl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-952-1-gsl/</link>
      <pubDate>Fri, 22 Sep 2023 00:30:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-952-1-gsl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-952-1-gsl/">
      
&lt;p&gt;Package : gsl&lt;/p&gt;


&lt;p&gt;Version : 1.16&amp;#43;dfsg-2&amp;#43;deb8u1 (jessie), 2.3&amp;#43;dfsg-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35357&#34;&gt;CVE-2020-35357&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow can occur when calculating the quantile value using the
Statistics Library of GSL (GNU Scientific Library). Processing a
maliciously crafted input data for gsl_stats_quantile_from_sorted_data of
the library may lead to unexpected application termination or arbitrary
code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-951-1 beep security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-951-1-beep/</link>
      <pubDate>Wed, 20 Sep 2023 23:58:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-951-1-beep/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-951-1-beep/">
      
&lt;p&gt;Package : beep&lt;/p&gt;


&lt;p&gt;Version : 1.3-4&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000532&#34;&gt;CVE-2018-1000532&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that beep, an advanced PC-speaker beeper, contains an External
Control of File Name or Path vulnerability in the &lt;code&gt;--device&lt;/code&gt; option that can allow a
local unprivileged user to inhibit execution of arbitrary programs by other
users, allowing DoS.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-950-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-950-1-python2.7/</link>
      <pubDate>Wed, 20 Sep 2023 21:44:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-950-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-950-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1-1&amp;#43;deb8u11 (jessie), 2.7.13-2&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0391&#34;&gt;CVE-2022-0391&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48560&#34;&gt;CVE-2022-48560&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48565&#34;&gt;CVE-2022-48565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48566&#34;&gt;CVE-2022-48566&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24329&#34;&gt;CVE-2023-24329&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40217&#34;&gt;CVE-2023-40217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes multiple vulnerabilities concerning the &lt;code&gt;urlparse&lt;/code&gt; module as
well as vulnerabilities concerning the &lt;code&gt;heapq&lt;/code&gt;, &lt;code&gt;hmac&lt;/code&gt;, &lt;code&gt;plistlib&lt;/code&gt; and &lt;code&gt;ssl&lt;/code&gt;
modules.&lt;/p&gt;
&lt;p&gt;CVE-2022-0391&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The `urlparse` module helps break Uniform Resource Locator (URL) strings
into components. The issue involves how the `urlparse` method does not
sanitize input and allows characters like `&#39;\r&#39;` and `&#39;\n&#39;` in the URL
path.  This flaw allows an attacker to input a crafted URL, leading to
injection attacks.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48560&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free exists in Python via `heappushpop` in `heapq`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48565&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An XML External Entity (XXE) issue was discovered in Python.  The
`plistlib` module no longer accepts entity declarations in XML plist files
to avoid XML vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-48566&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in `compare_digest` in `Lib/hmac.py` in Python.
Constant-time-defeating optimisations were possible in the accumulator
variable in `hmac.compare_digest`.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24329&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue in the `urlparse` component of Python allows attackers to bypass
blocklisting methods by supplying a URL that starts with blank characters.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-40217&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The issue primarily affects servers written in Python (such as HTTP
servers) that use TLS client authentication. If a TLS server-side socket is
created, receives data into the socket buffer, and then is closed quickly,
there is a brief window where the `SSLSocket` instance will detect the
socket as &amp;quot;not connected&amp;quot; and won&#39;t initiate a handshake, but buffered data
will still be readable from the socket buffer.  This data will not be
authenticated if the server-side TLS peer is expecting client certificate
authentication, and is indistinguishable from valid TLS stream data. Data
is limited in size to the amount that will fit in the buffer. (The TLS
connection cannot directly be used for data exfiltration because the
vulnerable code path requires that the connection be closed on
initialization of the `SSLSocket`.)
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-949-1 mutt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-949-1-mutt/</link>
      <pubDate>Wed, 20 Sep 2023 14:49:22 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-949-1-mutt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-949-1-mutt/">
      
&lt;p&gt;Package : mutt&lt;/p&gt;


&lt;p&gt;Version : 1.5.23-3&amp;#43;deb8u7 (jessie), 1.7.2-1&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4874&#34;&gt;CVE-2023-4874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-4875&#34;&gt;CVE-2023-4875&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two NULL pointer dereference flaws were discovered in Mutt, a text-based
mailreader supporting MIME, GPG, PGP and threading, which may result in denial
of service (application crash) when viewing a specially crafted email or when
composing from a specially crafted draft message.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-948-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-948-1-linux-4.19/</link>
      <pubDate>Wed, 20 Sep 2023 13:25:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-948-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-948-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.289-2~deb8u1 (jessie), 4.19.289-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40982&#34;&gt;CVE-2022-40982&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware
vulnerability for Intel CPUs which allows unprivileged speculative
access to data which was previously stored in vector registers.&lt;/p&gt;
&lt;p&gt;This mitigation requires updated CPU microcode provided in the
intel-microcode package and released as ELA-935-1.&lt;/p&gt;
&lt;p&gt;For details please refer to &lt;a href=&#34;https://downfall.page/&#34;&gt;https://downfall.page/&lt;/a&gt; and
&lt;a href=&#34;https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html&#34;&gt;https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-947-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-947-1-linux-5.10/</link>
      <pubDate>Wed, 20 Sep 2023 10:12:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-947-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-947-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.179-5~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40982&#34;&gt;CVE-2022-40982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20569&#34;&gt;CVE-2023-20569&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2022-40982&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware
vulnerability for Intel CPUs which allows unprivileged speculative
access to data which was previously stored in vector registers.

This mitigation requires updated CPU microcode provided in the
intel-microcode package.

For details please refer to &amp;lt;https://downfall.page/&amp;gt; and
&amp;lt;https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html&amp;gt;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-20569&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Daniel Trujillo, Johannes Wikner and Kaveh Razavi discovered
INCEPTION, also known as Speculative Return Stack Overflow (SRSO),
a transient execution attack that leaks arbitrary data on all AMD
Zen CPUs. An attacker can mis-train the CPU BTB to predict non-
architectural CALL instructions in kernel space and use this to
control the speculative target of a subsequent kernel RET,
potentially leading to information disclosure via a speculative
side-channel.

For details please refer to
&amp;lt;https://comsec.ethz.ch/research/microarch/inception/&amp;gt; and
&amp;lt;https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-7005&amp;gt;.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-946-1 c-ares security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-946-1-c-ares/</link>
      <pubDate>Fri, 15 Sep 2023 10:49:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-946-1-c-ares/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-946-1-c-ares/">
      
&lt;p&gt;Package : c-ares&lt;/p&gt;


&lt;p&gt;Version : 1.10.0-2&amp;#43;deb8u7 (jessie), 1.12.0-1&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22217&#34;&gt;CVE-2020-22217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been identified in c-ares, an asynchronous name
resolver library:&lt;/p&gt;
&lt;p&gt;CVE-2020-22217&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow vulnerability has been found in c-ares before
via the function ares_parse_soa_reply in ares_parse_soa_reply.c.
This vulnerability was discovered through fuzzing. Exploitation
of this vulnerability may allow an attacker to execute arbitrary
code or cause a denial of service condition.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-945-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-945-1-zabbix/</link>
      <pubDate>Sat, 09 Sep 2023 12:17:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-945-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-945-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:3.0.32&amp;#43;dfsg-0&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-7484&#34;&gt;CVE-2013-7484&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17382&#34;&gt;CVE-2019-17382&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43515&#34;&gt;CVE-2022-43515&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29450&#34;&gt;CVE-2023-29450&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29451&#34;&gt;CVE-2023-29451&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29454&#34;&gt;CVE-2023-29454&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29455&#34;&gt;CVE-2023-29455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29456&#34;&gt;CVE-2023-29456&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29457&#34;&gt;CVE-2023-29457&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a network
monitoring solution, potentially allowing to crash the server, information
disclosure or Cross-Site-Scripting attacks.&lt;/p&gt;
&lt;p&gt;Important Notices:
To mitigate CVE-2019-17382, on existing installations, the guest account
needs to be manually disabled, for example by disabling the the &amp;ldquo;Guest
group&amp;rdquo; in the UI:
Administration -&amp;gt; User groups -&amp;gt; Guests -&amp;gt; Untick Enabled&lt;/p&gt;
&lt;p&gt;CVE-2013-7484&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix before version 4.4.0alpha2 stores credentials in the &amp;quot;users&amp;quot;
table with the password hash stored as a MD5 hash, which is a known
insecure hashing method. Furthermore, no salt is used with the hash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17382 (Disputed, not considered by upstream to be a security issue)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in
zabbix.php?action=dashboard.view&amp;amp;dashboardid=1 in Zabbix through
4.4. An attacker can bypass the login page and access the dashboard
page, and then create a Dashboard, Report, Screen, or Map without
any Username/Password (i.e., anonymously). All created elements
(Dashboard/Report/Screen/Map) are accessible by other users and by
an admin.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43515&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zabbix Frontend provides a feature that allows admins to
maintain the installation and ensure that only certain IP addresses
can access it. In this way, any user will not be able to access the
Zabbix Frontend while it is being maintained and possible sensitive
data will be prevented from being disclosed. An attacker can bypass
this protection and access the instance using IP address not listed
in the defined range.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29450&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;JavaScript pre-processing can be used by the attacker to gain
access to the file system (read-only access on behalf of user
&amp;quot;zabbix&amp;quot;) on the Zabbix Server or Zabbix Proxy, potentially leading
to unauthorized access to sensitive data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29451&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Specially crafted string can cause a buffer overrun in the JSON
parser library leading to a crash of the Zabbix Server or a Zabbix
Proxy.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29454&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Stored or persistent cross-site scripting (XSS) vulnerability
was found on “Users” section in “Media” tab in “Send to” form field.
When new media is created with malicious code included into field
“Send to” then it will execute when editing the same media.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note: This issue was accidentially not mentioned in the debian changelog.&lt;/p&gt;
&lt;p&gt;CVE-2023-29455&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Reflected XSS attacks, also known as non-persistent attacks, was
found where an attacker can pass malicious code as GET request to
graph.php and system will save it and will execute when current
graph page is opened.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29456&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;URL validation scheme receives input from a user and then parses
it to identify its various components. The validation scheme can
ensure that all URL components comply with internet standards.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29457&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Reflected XSS attacks, also known as non-persistent attacks, was
found where XSS session cookies could be revealed, enabling a
perpetrator to impersonate valid users and abuse their private
accounts.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-944-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-944-1-python-django/</link>
      <pubDate>Thu, 07 Sep 2023 13:33:25 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-944-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-944-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u21 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41164&#34;&gt;CVE-2023-41164&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential denial of service vulnerability in
Django, a popular Python-based web development framework.&lt;/p&gt;
&lt;p&gt;Upstream reported that there was a potential vulnerability in
&lt;code&gt;django.utils.encoding.uri_to_iri()&lt;/code&gt;. This method was subject to potential DoS
attack via certain inputs with a very large number of Unicode characters.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-943-1 memcached security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-943-1-memcached/</link>
      <pubDate>Thu, 07 Sep 2023 11:46:12 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-943-1-memcached/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-943-1-memcached/">
      
&lt;p&gt;Package : memcached&lt;/p&gt;


&lt;p&gt;Version : 1.4.21-1.1&amp;#43;deb8u4 (jessie), 1.4.33-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48571&#34;&gt;CVE-2022-48571&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential Denial of Service (DoS)
vulnerability in &lt;code&gt;memcached&lt;/code&gt;, a high-performance in-memory object caching
system.&lt;/p&gt;
&lt;p&gt;A crash could have occurred when handling &amp;ldquo;multi-packet&amp;rdquo; uploads in UDP mode.
Deployments of memcached that only use TCP are likely unaffected by this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-942-1 qpdf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-942-1-qpdf/</link>
      <pubDate>Thu, 31 Aug 2023 23:57:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-942-1-qpdf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-942-1-qpdf/">
      
&lt;p&gt;Package : qpdf&lt;/p&gt;


&lt;p&gt;Version : 6.0.0-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9252&#34;&gt;CVE-2015-9252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9208&#34;&gt;CVE-2017-9208&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9209&#34;&gt;CVE-2017-9209&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9210&#34;&gt;CVE-2017-9210&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11624&#34;&gt;CVE-2017-11624&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11625&#34;&gt;CVE-2017-11625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11626&#34;&gt;CVE-2017-11626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11627&#34;&gt;CVE-2017-11627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12595&#34;&gt;CVE-2017-12595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18183&#34;&gt;CVE-2017-18183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18186&#34;&gt;CVE-2017-18186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9918&#34;&gt;CVE-2018-9918&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25786&#34;&gt;CVE-2021-25786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36978&#34;&gt;CVE-2021-36978&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were fixed in QPDF, a command-line tool and C++ library that performs content-preserving transformations on PDF files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-941-1 gst-plugins-ugly1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-941-1-gst-plugins-ugly1.0/</link>
      <pubDate>Thu, 31 Aug 2023 23:56:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-941-1-gst-plugins-ugly1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-941-1-gst-plugins-ugly1.0/">
      
&lt;p&gt;Package : gst-plugins-ugly1.0&lt;/p&gt;


&lt;p&gt;Version : 1.10.4-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


      &lt;p&gt;Demuxer vulnerabilities have been fixed in the RealMedia demuxers for
the GStreamer media framework&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-940-1 flask security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-940-1-flask/</link>
      <pubDate>Tue, 29 Aug 2023 21:07:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-940-1-flask/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-940-1-flask/">
      
&lt;p&gt;Package : flask&lt;/p&gt;


&lt;p&gt;Version : 0.12.1-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000656&#34;&gt;CVE-2018-1000656&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1010083&#34;&gt;CVE-2019-1010083&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Flask, a micro web framework for the Python programming language,
contains a improper input validation vulnerability (CWE-20) that can
result in large amount of memory usage, possibly leading to denial of
service. This attack appears to be exploitable through a crafted JSON
data in an incorrect encoding.
NOTE: this may overlap CVE-2019-1010083.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-939-1 unrar-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-939-1-unrar-nonfree/</link>
      <pubDate>Tue, 29 Aug 2023 00:28:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-939-1-unrar-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-939-1-unrar-nonfree/">
      
&lt;p&gt;Package : unrar-nonfree&lt;/p&gt;


&lt;p&gt;Version : 1:5.6.6-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40477&#34;&gt;CVE-2023-40477&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A specific flaw within the processing of recovery volumes exists in UnRAR,
an unarchiver for rar files. It allows remote attackers to execute arbitrary
code on affected installations. User interaction is required to exploit this
vulnerability. The target must visit a malicious page or open a malicious rar
file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-938-1 rar security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-938-1-rar/</link>
      <pubDate>Tue, 29 Aug 2023 00:18:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-938-1-rar/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-938-1-rar/">
      
&lt;p&gt;Package : rar&lt;/p&gt;


&lt;p&gt;Version : 2:6.23-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40477&#34;&gt;CVE-2023-40477&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A specific flaw within the processing of recovery volumes exists in RAR,
an archive program for rar files. It allows remote attackers to execute
arbitrary code on affected installations. User interaction is required to
exploit this vulnerability. The target must visit a malicious page or open a
malicious rar file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-937-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-937-1-clamav/</link>
      <pubDate>Mon, 28 Aug 2023 16:02:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-937-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-937-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.103.9&amp;#43;dfsg-0&amp;#43;deb8u1 (jessie), 0.103.9&amp;#43;dfsg-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20197&#34;&gt;CVE-2023-20197&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability in the filesystem image parser for Hierarchical File
System Plus (HFS+) of ClamAV, an anti-virus utility for Unix, could
allow an unauthenticated, remote attacker to cause a denial of service
(DoS) condition on an affected device.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-936-1 ruby-rack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-936-1-ruby-rack/</link>
      <pubDate>Mon, 28 Aug 2023 09:06:31 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-936-1-ruby-rack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-936-1-ruby-rack/">
      
&lt;p&gt;Package : ruby-rack&lt;/p&gt;


&lt;p&gt;Version : 1.6.4-4&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27539&#34;&gt;CVE-2023-27539&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found out that a carefully crafted input can cause header parsing in
Rack, a modular Ruby webserver interface, to take an unexpected amount of time,
possibly resulting in a denial of service attack vector. Any applications that
parse headers using Rack (virtually all Rails applications) are impacted.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-935-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-935-1-intel-microcode/</link>
      <pubDate>Sun, 27 Aug 2023 01:21:37 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-935-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-935-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20230808.1~deb8u1 (jessie), 3.20230808.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40982&#34;&gt;CVE-2022-40982&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41804&#34;&gt;CVE-2022-41804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23908&#34;&gt;CVE-2023-23908&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for some types of Intel CPUs
and provides mitigations for security vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2022-40982&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware
vulnerability which allows unprivileged speculative access to data
which was previously stored in vector registers.

For details please refer to https://downfall.page/ and
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41804&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unauthorized error injection in Intel SGX or Intel TDX for some
Intel Xeon Processors which may allow a local user to potentially
escalate privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23908&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper access control in some 3rd Generation Intel Xeon Scalable
processors may result in an information leak.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-934-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-934-1-php7.0/</link>
      <pubDate>Sat, 26 Aug 2023 21:47:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-934-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-934-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u16 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3823&#34;&gt;CVE-2023-3823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3824&#34;&gt;CVE-2023-3824&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been found in PHP, a server-side, HTML-embedded
scripting language.&lt;/p&gt;
&lt;p&gt;CVE-2023-3823&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In PHP various XML functions rely on libxml global state to track
configuration variables, like whether external entities are loaded. This
state is assumed to be unchanged unless the user explicitly changes it by
calling appropriate function. However, since the state is process-global,
other modules - such as ImageMagick - may also use this library within the
same process, and change that global state for their internal purposes, and
leave it in a state where external entities loading is enabled. This can
lead to the situation where external XML is parsed with external entities
loaded, which can lead to disclosure of any local files accessible to PHP.
This vulnerable state may persist in the same process across many requests,
until the process is shut down.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3824&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In PHP when loading phar file, while reading PHAR directory entries,
insufficient length checking may lead to a stack buffer overflow, leading
potentially to memory corruption or RCE.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-933-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-933-1-php5/</link>
      <pubDate>Sat, 26 Aug 2023 21:38:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-933-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-933-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u18 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3823&#34;&gt;CVE-2023-3823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3824&#34;&gt;CVE-2023-3824&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been found in PHP, a server-side, HTML-embedded
scripting language.&lt;/p&gt;
&lt;p&gt;CVE-2023-3823&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In PHP various XML functions rely on libxml global state to track
configuration variables, like whether external entities are loaded. This
state is assumed to be unchanged unless the user explicitly changes it by
calling appropriate function. However, since the state is process-global,
other modules - such as ImageMagick - may also use this library within the
same process, and change that global state for their internal purposes, and
leave it in a state where external entities loading is enabled. This can
lead to the situation where external XML is parsed with external entities
loaded, which can lead to disclosure of any local files accessible to PHP.
This vulnerable state may persist in the same process across many requests,
until the process is shut down.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3824&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In PHP when loading phar file, while reading PHAR directory entries,
insufficient length checking may lead to a stack buffer overflow, leading
potentially to memory corruption or RCE.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-932-1 openssl1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-932-1-openssl1.0/</link>
      <pubDate>Fri, 25 Aug 2023 23:29:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-932-1-openssl1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-932-1-openssl1.0/">
      
&lt;p&gt;Package : openssl1.0&lt;/p&gt;


&lt;p&gt;Version : 1.0.2u-1~deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1292&#34;&gt;CVE-2022-1292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2068&#34;&gt;CVE-2022-2068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0215&#34;&gt;CVE-2023-0215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0286&#34;&gt;CVE-2023-0286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0464&#34;&gt;CVE-2023-0464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0465&#34;&gt;CVE-2023-0465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0466&#34;&gt;CVE-2023-0466&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2650&#34;&gt;CVE-2023-2650&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in openssl1.0, a Secure Sockets Layer toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2022-1292, CVE-2022-2068&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The c_rehash script does not properly sanitise shell metacharacters to prevent
command injection. This script is executed by update-ca-certificates,
from ca-certificates, to re-hash certificates in /etc/ssl/certs/. An attacker
able to place files in this directory could execute arbitrary commands with
the privileges of the script.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0215, CVE-2023-0286&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple vulnerabilities may result in incomplete encryption, side channel attacks,
denial of service or information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0464&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin reported a flaw related to the verification of X.509 certificate
chains that include policy constraints, which may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0465&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin reported that invalid certificate policies in leaf certificates
are silently ignored. A malicious CA could take advantage of this flaw to
deliberately assert invalid certificate policies in order to circumvent policy
checking on the certificate altogether.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0466&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin discovered that the implementation of the
X509_VERIFY_PARAM_add0_policy() function does not enable the check which
allows certificates with invalid or incorrect policies to pass the certificate
verification (contrary to its documentation).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2650&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that processing malformed ASN.1 object identifiers or data
may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-931-1 w3m security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-931-1-w3m/</link>
      <pubDate>Thu, 24 Aug 2023 14:11:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-931-1-w3m/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-931-1-w3m/">
      
&lt;p&gt;Package : w3m&lt;/p&gt;


&lt;p&gt;Version : 0.5.3-19&amp;#43;deb8u4 (jessie), 0.5.3-34&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38223&#34;&gt;CVE-2022-38223&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Han Zheng discovered an out-of-bounds write in w3m, a text based web
browser and pager. It can be triggered by sending a crafted HTML file
to the w3m binary. It allows an attacker to cause Denial of Service
(DoS) or possibly have unspecified other impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-930-1 snapd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-930-1-snapd/</link>
      <pubDate>Wed, 23 Aug 2023 01:11:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-930-1-snapd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-930-1-snapd/">
      
&lt;p&gt;Package : snapd&lt;/p&gt;


&lt;p&gt;Version : 2.21-2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3328&#34;&gt;CVE-2022-3328&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing the private /tmp mount for a snap. A local
attacker could possibly use this issue to escalate privileges and execute
arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-929-1 qt4-x11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-929-1-qt4-x11/</link>
      <pubDate>Tue, 22 Aug 2023 18:50:04 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-929-1-qt4-x11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-929-1-qt4-x11/">
      
&lt;p&gt;Package : qt4-x11&lt;/p&gt;


&lt;p&gt;Version : 4:4.8.6&amp;#43;git64-g5dc8b2b&amp;#43;dfsg-3&amp;#43;deb8u5 (jessie), 4:4.8.7&amp;#43;dfsg-11&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32573&#34;&gt;CVE-2023-32573&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32763&#34;&gt;CVE-2023-32763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34410&#34;&gt;CVE-2023-34410&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37369&#34;&gt;CVE-2023-37369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38197&#34;&gt;CVE-2023-38197&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in qt4-x11, a graphical
windowing toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2021-3481&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;While rendering and displaying a crafted Scalable Vector Graphics
(SVG) file this flaw may lead to an unauthorized memory access. The
highest threat from this vulnerability is to data confidentiality
and the application availability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-45930&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds write in
QtPrivate::QCommonArrayOps&amp;lt;QPainterPath::Element&amp;gt;::growAppend
(called from QPainterPath::addPath and QPathClipper::intersect).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32573&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Uninitialized variable usage in m_unitsPerEm.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32763&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An application crash in QXmlStreamReader via a crafted XML string
that triggers a situation in which a prefix is greater than a
length.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34410&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Certificate validation for TLS does not always consider whether the
root of a chain is a configured CA certificate.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-37369&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There can be an application crash in QXmlStreamReader via a crafted
XML string that triggers a situation in which a prefix is greater
than a length.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-38197&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There are infinite loops in recursive entity expansion.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-928-1 poppler security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-928-1-poppler/</link>
      <pubDate>Mon, 21 Aug 2023 17:04:48 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-928-1-poppler/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-928-1-poppler/">
      
&lt;p&gt;Package : poppler&lt;/p&gt;


&lt;p&gt;Version : 0.26.5-2&amp;#43;deb8u16 (jessie), 0.48.0-2&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36023&#34;&gt;CVE-2020-36023&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36024&#34;&gt;CVE-2020-36024&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been fixed in poppler,
a PDF rendering library.&lt;/p&gt;
&lt;p&gt;CVE-2020-36023&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Infinite loop in FoFiType1C::cvtGlyph()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36024&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL dereference in FoFiType1C::convertToType1()
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-927-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-927-1-ffmpeg/</link>
      <pubDate>Mon, 21 Aug 2023 10:28:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-927-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-927-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28429&#34;&gt;CVE-2021-28429&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in ffmpeg, a tool/library for transcoding, streaming and playing of multimedia files.
Due to an integer overflow in av_timecode_make_string() in libavutil/timecode.c, local attackers might cause a Dos with crafted .mov files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-926-1 opendmarc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-926-1-opendmarc/</link>
      <pubDate>Fri, 18 Aug 2023 02:00:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-926-1-opendmarc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-926-1-opendmarc/">
      
&lt;p&gt;Package : opendmarc&lt;/p&gt;


&lt;p&gt;Version : 1.3.2&amp;#43;ds-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20790&#34;&gt;CVE-2019-20790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12272&#34;&gt;CVE-2020-12272&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2019-20790&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OpenDMARC when used with pypolicyd-spf 2.0.2, allows attacks that bypass
SPF and DMARC authentication in situations where the HELO field is
inconsistent with the MAIL FROM field.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12272&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OpenDMARC allows attacks that inject authentication results to provide
false information about the domain that originated an e-mail message. This
is caused by incorrect parsing and interpretation of SPF/DKIM
authentication results, as demonstrated by the example.net(.example.com
substring.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-925-1 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-925-1-openssh/</link>
      <pubDate>Fri, 18 Aug 2023 05:00:01 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-925-1-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-925-1-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:6.7p1-5&amp;#43;deb8u9 (jessie), 1:7.4p1-10&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38408&#34;&gt;CVE-2023-38408&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in
OpenSSH has an insufficiently trustworthy search path, leading to remote code
execution if an agent is forwarded to an attacker-controlled system (the code
in /usr/lib is not necessarily safe for loading into ssh-agent).&lt;/p&gt;
&lt;p&gt;This flaw allows an attacker with control of the forwarded agent-socket on the
server and the ability to write to the filesystem of the client host to execute
arbitrary code with the privileges of the user running the ssh-agent.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-924-1 open-vm-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-924-1-open-vm-tools/</link>
      <pubDate>Thu, 17 Aug 2023 09:49:42 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-924-1-open-vm-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-924-1-open-vm-tools/">
      
&lt;p&gt;Package : open-vm-tools&lt;/p&gt;


&lt;p&gt;Version : 2:9.4.6-1770165-8&amp;#43;deb8u1 (jessie), 2:10.1.5-5055683-4&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20867&#34;&gt;CVE-2023-20867&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;open-vm-tools is a package that provides Open VMware Tools for virtual
machines hosted on VMware.&lt;/p&gt;
&lt;p&gt;It was discovered that Open VM Tools incorrectly handled certain
authentication requests. A fully compromised ESXi host can force Open
VM Tools to fail to authenticate host-to-guest operations, impacting
the confidentiality and integrity of the guest virtual machine.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-923-1 libssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-923-1-libssh/</link>
      <pubDate>Wed, 16 Aug 2023 19:19:49 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-923-1-libssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-923-1-libssh/">
      
&lt;p&gt;Package : libssh&lt;/p&gt;


&lt;p&gt;Version : 0.6.3-4&amp;#43;deb8u6 (jessie), 0.7.3-2&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14889&#34;&gt;CVE-2019-14889&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1667&#34;&gt;CVE-2023-1667&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security issues have been discovered in libssh, a tiny C SSH
library, which may allow a remote authenticated user to cause a denial
of service or inject arbitrary commands.&lt;/p&gt;
&lt;p&gt;CVE-2019-14889&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found with the libssh API function ssh_scp_new() in
versions before 0.9.3 and before 0.8.8. When the libssh SCP client
connects to a server, the scp command, which includes a
user-provided path, is executed on the server-side. In case the
library is used in a way where users can influence the third
parameter of the function, it would become possible for an attacker
to inject arbitrary commands, leading to a compromise of the remote
target.

Note that this CVE was previously fixed in jessie and that it has
now been fixed in stretch.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1667&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference was found In libssh during re-keying with
algorithm guessing. This issue may allow an authenticated client to
cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-922-1 rar security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-922-1-rar/</link>
      <pubDate>Wed, 16 Aug 2023 19:48:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-922-1-rar/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-922-1-rar/">
      
&lt;p&gt;Package : rar&lt;/p&gt;


&lt;p&gt;Version : 2:6.20-0.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30333&#34;&gt;CVE-2022-30333&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The RAR archiver allows directory traversal to write to files during an extract
(aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys
file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-921-1 unrar-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-921-1-unrar-nonfree/</link>
      <pubDate>Wed, 16 Aug 2023 12:01:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-921-1-unrar-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-921-1-unrar-nonfree/">
      
&lt;p&gt;Package : unrar-nonfree&lt;/p&gt;


&lt;p&gt;Version : 1:5.6.6-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12938&#34;&gt;CVE-2017-12938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12940&#34;&gt;CVE-2017-12940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12941&#34;&gt;CVE-2017-12941&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12942&#34;&gt;CVE-2017-12942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-20006&#34;&gt;CVE-2017-20006&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25018&#34;&gt;CVE-2018-25018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30333&#34;&gt;CVE-2022-30333&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48579&#34;&gt;CVE-2022-48579&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that UnRAR, an unarchiver for rar files, allows extraction of
files outside of the destination folder via symlink chains. Programming flaws
like heap-based buffer overflows or out-of-bounds reads may also cause a denial
of service (application crash) if a malformed rar archive is extracted.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-920-1 datatables.js security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-920-1-datatables.js/</link>
      <pubDate>Tue, 15 Aug 2023 19:46:27 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-920-1-datatables.js/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-920-1-datatables.js/">
      
&lt;p&gt;Package : datatables.js&lt;/p&gt;


&lt;p&gt;Version : 1.10.13&amp;#43;dfsg-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23445&#34;&gt;CVE-2021-23445&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;datatables.js is a jQuery plug-in that makes nice tables from different
data sources.&lt;/p&gt;
&lt;p&gt;It was discovered that if an array is passed to the HTML escape entities
function, it would not have its contents escaped.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-919-1 hdf5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-919-1-hdf5/</link>
      <pubDate>Mon, 14 Aug 2023 00:35:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-919-1-hdf5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-919-1-hdf5/">
      
&lt;p&gt;Package : hdf5&lt;/p&gt;


&lt;p&gt;Version : 1.10.0-patch1&amp;#43;docs-3&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17233&#34;&gt;CVE-2018-17233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17234&#34;&gt;CVE-2018-17234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17237&#34;&gt;CVE-2018-17237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17434&#34;&gt;CVE-2018-17434&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17437&#34;&gt;CVE-2018-17437&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were discovered in HDF5, a Hierarchical Data
Format and a library for scientific data. Memory leaks, out-of-bound reads and
division by zero errors may lead to a denial of service when processing a
malformed HDF file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-918-1 sox security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-918-1-sox/</link>
      <pubDate>Sun, 13 Aug 2023 15:47:40 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-918-1-sox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-918-1-sox/">
      
&lt;p&gt;Package : sox&lt;/p&gt;


&lt;p&gt;Version : 14.4.1-5&amp;#43;deb8u7 (jessie), 14.4.1-5&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32627&#34;&gt;CVE-2023-32627&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;SoX is a command line utility that can convert various formats of computer audio files in to other formats. It can also apply various effects to these sound files during the conversion.&lt;/p&gt;
&lt;p&gt;Sox was vulnerable to divide by zero vulnerability by reading an specialy crafted Creative Voice File (.voc) file, in the read_samples function. This flaw can lead to a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-917-1 systemd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-917-1-systemd/</link>
      <pubDate>Thu, 10 Aug 2023 00:24:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-917-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-917-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 215-17&amp;#43;deb8u15 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3821&#34;&gt;CVE-2022-3821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26604&#34;&gt;CVE-2023-26604&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Systemd is a system and service manager. The following security vulnerabilities
have been fixed.&lt;/p&gt;
&lt;p&gt;CVE-2023-26604&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;systemd does not adequately block local privilege escalation for
some Sudo configurations, e.g., plausible sudoers files in which the
&amp;quot;systemctl status&amp;quot; command may be executed. Specifically, systemd does not
set LESSSECURE to 1, and thus other programs may be launched from the less
program. This presents a substantial security risk when running systemctl
from Sudo, because less executes as root when the terminal size is too
small to show the complete systemctl output.

This update introduces a new systemd environment variable called
$SYSTEMD_PAGERSECURE. By default it is set to true which means LESSSECURE
is set to 1. However only the less pager implements such a security
feature and thus will be used whenever $SYSTEMD_PAGERSECURE is true. You
can disable this feature by setting $SYSTEMD_PAGERSECURE to false.

As a general precaution we recommend to carefully review an existing
sudoers file and reassess if certain privileges are still required for
normal users.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3821&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An off-by-one error issue was discovered in Systemd in format_timespan()
function of time-util.c. An attacker could supply specific values for time
and accuracy that leads to buffer overrun in format_timespan(), leading to
a Denial of Service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-829-1 lldpd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-829-1-lldpd/</link>
      <pubDate>Mon, 07 Aug 2023 14:13:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-829-1-lldpd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-829-1-lldpd/">
      
&lt;p&gt;Package : lldpd&lt;/p&gt;


&lt;p&gt;Version : 0.9.6-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27827&#34;&gt;CVE-2020-27827&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43612&#34;&gt;CVE-2021-43612&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two potential denial of service (DoS) attacks
in &lt;code&gt;lldpd&lt;/code&gt;, a implementation of the IEEE 802.1ab (LLDP) protocol used to
administer and monitor networking devices.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-916-1 systemd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-916-1-systemd/</link>
      <pubDate>Fri, 04 Aug 2023 22:24:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-916-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-916-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 232-25&amp;#43;deb9u16 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3821&#34;&gt;CVE-2022-3821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26604&#34;&gt;CVE-2023-26604&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Systemd is a system and service manager. The following security vulnerabilities
have been fixed.&lt;/p&gt;
&lt;p&gt;CVE-2023-26604&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;systemd does not adequately block local privilege escalation for
some Sudo configurations, e.g., plausible sudoers files in which the
&amp;quot;systemctl status&amp;quot; command may be executed. Specifically, systemd does not
set LESSSECURE to 1, and thus other programs may be launched from the less
program. This presents a substantial security risk when running systemctl
from Sudo, because less executes as root when the terminal size is too
small to show the complete systemctl output.

This update introduces a new systemd environment variable called
$SYSTEMD_PAGERSECURE. By default it is set to true which means LESSSECURE
is set to 1. However only the less pager implements such a security
feature and thus will be used whenever $SYSTEMD_PAGERSECURE is true. You
can disable this feature by setting $SYSTEMD_PAGERSECURE to false.

As a general precaution we recommend to carefully review an existing
sudoers file and reassess if certain privileges are still required for
normal users.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3821&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An off-by-one error issue was discovered in Systemd in format_timespan()
function of time-util.c. An attacker could supply specific values for time
and accuracy that leads to buffer overrun in format_timespan(), leading to
a Denial of Service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-915-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-915-1-linux-5.10/</link>
      <pubDate>Fri, 04 Aug 2023 14:56:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-915-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-915-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.179-3~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2156&#34;&gt;CVE-2023-2156&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3390&#34;&gt;CVE-2023-3390&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3610&#34;&gt;CVE-2023-3610&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20593&#34;&gt;CVE-2023-20593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31248&#34;&gt;CVE-2023-31248&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35001&#34;&gt;CVE-2023-35001&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2023-2156&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a flaw in the handling of the RPL protocol
may allow an unauthenticated remote attacker to cause a denial of
service if RPL is enabled (not by default in Debian).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3390&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw in the netfilter subsystem caused by
incorrect error path handling may result in denial of service or
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3610&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw in the netfilter subsystem caused by
incorrect refcount handling on the table and chain destroy path
may result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-20593&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tavis Ormandy discovered that under specific microarchitectural
circumstances, a vector register in AMD &amp;quot;Zen 2&amp;quot; CPUs may not be
written to 0 correctly.  This flaw allows an attacker to leak
sensitive information across concurrent processes, hyper threads
and virtualized guests.

For details please refer to
&amp;lt;https://lock.cmpxchg8b.com/zenbleed.html&amp;gt; and
&amp;lt;https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8&amp;gt;.

This issue can also be mitigated by a microcode update through the
amd64-microcode package or a system firmware (BIOS/UEFI) update.
However, the initial microcode release by AMD only provides
updates for second generation EPYC CPUs.  Various Ryzen CPUs are
also affected, but no updates are available yet.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31248&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mingi Cho discovered a use-after-free flaw in the Netfilter
nf_tables implementation when using nft_chain_lookup_byid, which
may result in local privilege escalation for a user with the
CAP_NET_ADMIN capability in any user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35001&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tanguy DUBROCA discovered an out-of-bounds reads and write flaw in
the Netfilter nf_tables implementation when processing an
nft_byteorder expression, which may result in local privilege
escalation for a user with the CAP_NET_ADMIN capability in any
user or network namespace.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-914-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-914-1-python-django/</link>
      <pubDate>Fri, 04 Aug 2023 13:07:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-914-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-914-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u20 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45115&#34;&gt;CVE-2021-45115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45116&#34;&gt;CVE-2021-45116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45452&#34;&gt;CVE-2021-45452&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24580&#34;&gt;CVE-2023-24580&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31047&#34;&gt;CVE-2023-31047&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A number of vulnerabilities were discovered in
&lt;a href=&#34;https://www.djangoproject.com/&#34;&gt;Django&lt;/a&gt;, a popular Python-based web
development framework.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-45115: Denial-of-service possibility in the
&lt;code&gt;UserAttributeSimilarityValidator&lt;/code&gt; class. &lt;code&gt;UserAttributeSimilarityValidator&lt;/code&gt;
incurred significant overhead evaluating submitted password that were
artificially large in relative to the comparison values. On the assumption
that access to user registration was unrestricted this provided a potential
vector for a denial-of-service attack. In order to mitigate this issue,
relatively long values are now ignored by this class.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-45116: Potential information disclosure in &lt;code&gt;dictsort&lt;/code&gt; template
filter. Due to leveraging the Django Template Language&amp;rsquo;s variable resolution
logic, the &lt;code&gt;dictsort&lt;/code&gt; template filter was potentially vulnerable to
information disclosure or unintended method calls, if passed a suitably
crafted key. In order to avoid this possibility, &lt;code&gt;dictsort&lt;/code&gt; now works with a
restricted resolution logic, that will not call methods, nor allow indexing
on dictionaries.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-45452: Potential directory-traversal via &lt;code&gt;Storage.save()&lt;/code&gt;.
&lt;code&gt;Storage.save()&lt;/code&gt; allowed directory-traversal if directly passed suitably
crafted file names.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-24580: Potential denial-of-service vulnerability in file uploads.
Passing certain inputs to multipart forms could result in too many open files
or memory exhaustion, and provided a potential vector for a denial-of-service
attack. The number of files parts parsed is now limited via the new
&lt;code&gt;DATA_UPLOAD_MAX_NUMBER_FILES&lt;/code&gt; setting.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-31047: Prevent a potential bypass of validation when uploading
multiple files using one form field. Uploading multiple files using one form
field has never been supported by &lt;code&gt;forms.FileField&lt;/code&gt; or &lt;code&gt;forms.ImageField&lt;/code&gt; as
only the last uploaded file was validated. Unfortunately, Uploading multiple
files topic suggested otherwise. In order to avoid the vulnerability, the
&lt;code&gt;ClearableFileInput&lt;/code&gt; and &lt;code&gt;FileInput&lt;/code&gt; form widgets now raise &lt;code&gt;ValueError&lt;/code&gt; when
the multiple HTML attribute is set on them. To prevent the exception and keep
the old behavior, set the &lt;code&gt;allow_multiple_selected&lt;/code&gt; attribute to &lt;code&gt;True&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-913-1 bouncycastle security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-913-1-bouncycastle/</link>
      <pubDate>Wed, 02 Aug 2023 18:40:10 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-913-1-bouncycastle/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-913-1-bouncycastle/">
      
&lt;p&gt;Package : bouncycastle&lt;/p&gt;


&lt;p&gt;Version : 1.56-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-33201&#34;&gt;CVE-2023-33201&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bouncy Castle is a collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages.&lt;/p&gt;
&lt;p&gt;Bouncy Castle was vulnerable due to a LDAP injection in X509 certificates handling.  The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate&amp;rsquo;s Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-912-1 symfony security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-912-1-symfony/</link>
      <pubDate>Wed, 02 Aug 2023 18:25:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-912-1-symfony/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-912-1-symfony/">
      
&lt;p&gt;Package : symfony&lt;/p&gt;


&lt;p&gt;Version : 2.8.7&amp;#43;dfsg-1.3&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14774&#34;&gt;CVE-2018-14774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21424&#34;&gt;CVE-2021-21424&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24894&#34;&gt;CVE-2022-24894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24895&#34;&gt;CVE-2022-24895&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were found in symfony, a PHP framework for
web and console applications and a set of reusable PHP components, which could
lead to information disclosure or impersonation.&lt;/p&gt;
&lt;p&gt;CVE-2018-14774&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When using HttpCache, the values of the X-Forwarded-Host headers are implicitly
and wrongly set as trusted, leading to potential host header injection.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-21424&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;James Isaac, Mathias Brodala and Laurent Minguet discovered that it was
possible to enumerate users without relevant permissions due to different
exception messages depending on whether the user existed or not. It was also
possible to enumerate users by using a timing attack, by comparing time
elapsed when authenticating an existing user and authenticating a
non-existing user.

403s are now returned whether the user exists or not if a user cannot
switch to a user or if the user does not exist.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24894&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Soner Sayakci discovered that when the Symfony HTTP cache system is
enabled, the response header might be stored with a Set-Cookie header and
returned to some other clients, thereby allowing an attacker to retrieve the
victim&#39;s session.

The HttpStore constructor now takes a parameter containing a list of
private headers that are removed from the HTTP response headers. The default
value for this parameter is Set-Cookie, but it can be overridden or extended
by the application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24895&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Marco Squarcina discovered that CSRF tokens weren&#39;t cleared upon login,
which could enable same-site attackers to bypass the CSRF protection
mechanism by performing an attack similar to a session-fixation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-911-1 phpmyadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-911-1-phpmyadmin/</link>
      <pubDate>Wed, 02 Aug 2023 00:11:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-911-1-phpmyadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-911-1-phpmyadmin/">
      
&lt;p&gt;Package : phpmyadmin&lt;/p&gt;


&lt;p&gt;Version : 4:4.6.6-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22452&#34;&gt;CVE-2020-22452&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25727&#34;&gt;CVE-2023-25727&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;phpMyAdmin is a popular MySQL web administration tool. The following security
vulnerabilities have been addressed:&lt;/p&gt;
&lt;p&gt;CVE-2020-22452&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SQL Injection vulnerability in function getTableCreationQuery in
CreateAddField.php in phpMyAdmin via the tbl_storage_engine or
tbl_collation parameters to tbl_create.php.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25727&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In phpMyAdmin an authenticated user can trigger XSS by uploading a crafted
.sql file through the drag-and-drop interface.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-910-1 amd64-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-910-1-amd64-microcode/</link>
      <pubDate>Tue, 01 Aug 2023 10:41:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-910-1-amd64-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-910-1-amd64-microcode/">
      
&lt;p&gt;Package : amd64-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20230719.1~deb8u1 (jessie), 3.20230719.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9836&#34;&gt;CVE-2019-9836&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20592&#34;&gt;CVE-2023-20592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20593&#34;&gt;CVE-2023-20593&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Tavis Ormandy discovered that under specific microarchitectural
circumstances, a vector register in &amp;ldquo;Zen 2&amp;rdquo; CPUs may not be written to 0
correctly. This flaw allows an attacker to leak register contents across
concurrent processes, hyper threads and virtualized guests.&lt;/p&gt;
&lt;p&gt;For details please refer to
&lt;a href=&#34;https://lock.cmpxchg8b.com/zenbleed.html&#34;&gt;https://lock.cmpxchg8b.com/zenbleed.html&lt;/a&gt;
&lt;a href=&#34;https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8&#34;&gt;https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The initial microcode release by AMD only provides updates for second
generation EPYC CPUs: Various Ryzen CPUs are also affected, but no
updates are available yet. Fixes will be provided in a later update once
they are released.&lt;/p&gt;
&lt;p&gt;Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler
and Michael Schwarz discovered a software-based fault injection attack on SEV VMs,
leading to a potential loss of guest virtual machine memory integrity.&lt;/p&gt;
&lt;p&gt;For details please refer to
&lt;a href=&#34;https://cachewarpattack.com/&#34;&gt;https://cachewarpattack.com/&lt;/a&gt;
&lt;a href=&#34;https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3005.html&#34;&gt;https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3005.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For more specific details and target dates please refer to the AMD
advisory at
&lt;a href=&#34;https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html&#34;&gt;https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-909-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-909-1-tiff/</link>
      <pubDate>Mon, 31 Jul 2023 23:50:52 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-909-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-909-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u16 (jessie), 4.0.8-2&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2908&#34;&gt;CVE-2023-2908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3316&#34;&gt;CVE-2023-3316&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3618&#34;&gt;CVE-2023-3618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25433&#34;&gt;CVE-2023-25433&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26965&#34;&gt;CVE-2023-26965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26966&#34;&gt;CVE-2023-26966&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-40745&#34;&gt;CVE-2023-40745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-41175&#34;&gt;CVE-2023-41175&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2023-2908&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference in tif_dir.c
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3316&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference in TIFFClose()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in tiffcrop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25433&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in tiffcrop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-26965&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use after free in tiffcrop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-26966&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflow in uv_encode()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-40745&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in tiffcp
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-41175&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in raw2tiff
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-908-1 netty-3.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-908-1-netty-3.9/</link>
      <pubDate>Mon, 31 Jul 2023 18:34:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-908-1-netty-3.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-908-1-netty-3.9/">
      
&lt;p&gt;Package : netty-3.9&lt;/p&gt;


&lt;p&gt;Version : 3.9.0.Final-1&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21290&#34;&gt;CVE-2021-21290&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an insecure temporary file issue that could
have lead to disclosure of arbitrary local files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-907-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-907-1-linux-4.19/</link>
      <pubDate>Mon, 31 Jul 2023 12:02:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-907-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-907-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.289-1~deb8u1 (jessie), 4.19.289-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1380&#34;&gt;CVE-2023-1380&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2002&#34;&gt;CVE-2023-2002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2007&#34;&gt;CVE-2023-2007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2269&#34;&gt;CVE-2023-2269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3090&#34;&gt;CVE-2023-3090&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3111&#34;&gt;CVE-2023-3111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3141&#34;&gt;CVE-2023-3141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3268&#34;&gt;CVE-2023-3268&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3338&#34;&gt;CVE-2023-3338&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20593&#34;&gt;CVE-2023-20593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31084&#34;&gt;CVE-2023-31084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32233&#34;&gt;CVE-2023-32233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34256&#34;&gt;CVE-2023-34256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35788&#34;&gt;CVE-2023-35788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35823&#34;&gt;CVE-2023-35823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35824&#34;&gt;CVE-2023-35824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-35828&#34;&gt;CVE-2023-35828&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2023-1380&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jisoo Jang reported a heap out-of-bounds read in the brcmfmac
Wi-Fi driver.  On systems using this driver, a local user could
exploit this to read sensitive information or to cause a denial of
service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2002&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ruiahn Li reported an incorrect permissions check in the Bluetooth
subsystem.  A local user could exploit this to reconfigure local
Bluetooth interfaces, resulting in information leaks, spoofing, or
denial of service (loss of connection).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2007&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lucas Leong (@_wmliang_) and Reno Robert of Trend Micro Zero Day
Initiative discovered a time-of-check-to-time-of-use flaw in the
dpt_i2o SCSI controller driver.  A local user with access to a
SCSI device using this driver could exploit this for privilege
escalation.

This flaw has been mitigated by removing support for the I2OUSRCMD
operation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2269&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Zhang reported that improper handling of locking in the
device mapper implementation may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3090&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that missing initialization in ipvlan networking
may lead to an out-of-bounds write vulnerability, resulting in
denial of service or potentially the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3111&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The TOTE Robot tool found a flaw in the Btrfs filesystem driver
that can lead to a use-after-free.  It&#39;s unclear whether an
unprivileged user can exploit this.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3141&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the r592 memstick driver that could lead
to a use-after-free after the driver is removed or unbound from a
device.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3268&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that an out-of-bounds memory access in relayfs
could result in denial of service or an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-3338&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ornaghi Davide discovered a flaw in the DECnet protocol
implementation which could lead to a null pointer dereference or
use-after-free.  A local user can exploit this to cause a denial
of service (crash or memory corruption) and probably for privilege
escalation.

This flaw has been mitigated by removing the DECnet protocol
implementation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-20593&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tavis Ormandy discovered that under specific microarchitectural
circumstances, a vector register in AMD &amp;quot;Zen 2&amp;quot; CPUs may not be
written to 0 correctly.  This flaw allows an attacker to leak
sensitive information across concurrent processes, hyper threads
and virtualized guests.

For details please refer to
&amp;lt;https://lock.cmpxchg8b.com/zenbleed.html&amp;gt; and
&amp;lt;https://github.com/google/security-research/security/advisories/GHSA-v6wh-rxpg-cmm8&amp;gt;.

This issue can also be mitigated by a microcode update through the
amd64-microcode package or a system firmware (BIOS/UEFI) update.
However, the initial microcode release by AMD only provides
updates for second generation EPYC CPUs.  Various Ryzen CPUs are
also affected, but no updates are available yet.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31084&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the DVB Core driver does not properly
handle locking of certain events, allowing a local user to cause a
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32233&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Patryk Sondej and Piotr Krysiuk discovered a use-after-free flaw
in the Netfilter nf_tables implementation when processing batch
requests, which may result in local privilege escalation for a
user with the CAP_NET_ADMIN capability in any user or network
namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-34256&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a time-of-check-to-time-of-use flaw in the
ext4 filesystem driver.  An attacker able to mount a disk image or
device that they can also write to directly could exploit this to
cause an out-of-bounds read, possibly resulting in a leak of
sensitive information or denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35788&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hangyu Hua discovered an out-of-bounds write vulnerability in the
Flower classifier which may result in denial of service or the
execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35823&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the saa7134 media driver that could lead
to a use-after-free after the driver is removed or unbound from a
device.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35824&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the dm1105 media driver that could lead
to a use-after-free after the driver is removed or unbound from a
device.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-35828&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the renesas_udc USB device-mode driver
that could lead to a use-after-free after the driver is removed or
unbound from a device.  The security impact of this is unclear.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-906-1 monit security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-906-1-monit/</link>
      <pubDate>Sun, 30 Jul 2023 22:33:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-906-1-monit/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-906-1-monit/">
      
&lt;p&gt;Package : monit&lt;/p&gt;


&lt;p&gt;Version : 1:5.9-1&amp;#43;deb8u3 (jessie), 1:5.20.0-6&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26563&#34;&gt;CVE-2022-26563&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Youssef Rebahi-Gilbert discovered that users with disabled accounts but with a
valid password can login to Monit, a utility for monitoring and managing
daemons or similar programs, due to a flaw in the PAM authentication check.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-905-1 ckeditor security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-905-1-ckeditor/</link>
      <pubDate>Sat, 29 Jul 2023 09:32:16 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-905-1-ckeditor/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-905-1-ckeditor/">
      
&lt;p&gt;Package : ckeditor&lt;/p&gt;


&lt;p&gt;Version : 4.4.4&amp;#43;dfsg1-2&amp;#43;deb8u2 (jessie), 4.5.7&amp;#43;dfsg-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37695&#34;&gt;CVE-2021-37695&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A regression was introduced after fixing CVE-2021-37695 in ckeditor a rich text editor for the web written in javascript.
This regression was due to lack of polyfill (a snippet of code that patches a piece of functionality that is missing in
some browsers) in stretch and jessie for javascript array class. This was fixed by manually emulating the polyfill. This regression
was introduced in DLA-2813-1 for stretch and ELA-513-1 for jessie.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-903-1 phpseclib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-903-1-phpseclib/</link>
      <pubDate>Thu, 27 Jul 2023 21:09:45 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-903-1-phpseclib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-903-1-phpseclib/">
      
&lt;p&gt;Package : phpseclib&lt;/p&gt;


&lt;p&gt;Version : 1.0.19-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30130&#34;&gt;CVE-2021-30130&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The PHP Secure Communications Library is a fully PKCS#1 (v2.1) compliant RSA, DES, 3DES, RC4, Rijndael, AES, Blowfish, Twofish, SSH-1, SSH-2, SFTP, and X.509 implementation. This library mishandled RSA PKCS#1 v1.5 signature verification.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-902-1 iperf3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-902-1-iperf3/</link>
      <pubDate>Thu, 27 Jul 2023 18:05:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-902-1-iperf3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-902-1-iperf3/">
      
&lt;p&gt;Package : iperf3&lt;/p&gt;


&lt;p&gt;Version : 3.0.7-1&amp;#43;deb8u2 (jessie), 3.1.3-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-38403&#34;&gt;CVE-2023-38403&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A memory allocation issue was found in iperf3, the Internet Protocol bandwidth
measuring tool, that may cause a denial of service when encountering a certain
invalid length value in TCP packets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-901-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-901-1-openjdk-8/</link>
      <pubDate>Thu, 27 Jul 2023 16:24:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-901-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-901-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u382-ga-1~deb8u1 (jessie), 8u382-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22045&#34;&gt;CVE-2023-22045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22049&#34;&gt;CVE-2023-22049&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in bypass of sandbox restrictions, information
disclosure or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-900-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-900-1-gst-plugins-good1.0/</link>
      <pubDate>Tue, 25 Jul 2023 23:52:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-900-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-900-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u6 (jessie), 1.10.4-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37327&#34;&gt;CVE-2023-37327&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple multiple vulnerabilities were discovered in plugins for the
GStreamer media framework and its codecs and demuxers, which may result
in denial of service or potentially the execution of arbitrary code if
a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-899-1 gst-plugins-base1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-899-1-gst-plugins-base1.0/</link>
      <pubDate>Tue, 25 Jul 2023 23:48:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-899-1-gst-plugins-base1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-899-1-gst-plugins-base1.0/">
      
&lt;p&gt;Package : gst-plugins-base1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u4 (jessie), 1.10.4-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37328&#34;&gt;CVE-2023-37328&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple multiple vulnerabilities were discovered in plugins for the
GStreamer media framework and its codecs and demuxers, which may result
in denial of service or potentially the execution of arbitrary code if
a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-898-1 gst-plugins-bad1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-898-1-gst-plugins-bad1.0/</link>
      <pubDate>Tue, 25 Jul 2023 23:45:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-898-1-gst-plugins-bad1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-898-1-gst-plugins-bad1.0/">
      
&lt;p&gt;Package : gst-plugins-bad1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2.1&amp;#43;deb8u5 (jessie), 1.10.4-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37329&#34;&gt;CVE-2023-37329&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple multiple vulnerabilities were discovered in plugins for the
GStreamer media framework and its codecs and demuxers, which may result
in denial of service or potentially the execution of arbitrary code if
a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-904-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-904-1-bind9/</link>
      <pubDate>Tue, 25 Jul 2023 12:15:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-904-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-904-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u29 (jessie), 1:9.10.3.dfsg.P4-12.3&amp;#43;deb9u14 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2828&#34;&gt;CVE-2023-2828&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential denial of service (DoS) vulnerability was discovered in bind9, the
popular DNS server.&lt;/p&gt;
&lt;p&gt;Every &lt;code&gt;named&lt;/code&gt; instance configured to run as a recursive resolver maintains a
cache database holding the responses to the queries it has recently sent to
authoritative servers. The size limit for that cache database can be configured
using the &lt;code&gt;max-cache-size&lt;/code&gt; statement in the configuration file which defaults
to 90% of the total amount of memory available on the host. When the size of
the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm
starts to remove expired and/or least-recently used RRsets from the cache in
order to keep memory use below the configured limit.&lt;/p&gt;
&lt;p&gt;However, it was discovered that the effectiveness of the cache-cleaning
algorithm used in &lt;code&gt;named&lt;/code&gt; can be severely diminished by querying the resolver
for specific RRsets in a certain order, effectively allowing the configured
max-cache-size limit to be significantly exceeded.&lt;/p&gt;
&lt;p&gt;By exploiting this flaw, an attacker could have caused the amount of memory
used by a &lt;code&gt;named&lt;/code&gt; resolver to go well beyond the configured &lt;code&gt;max-cache-size&lt;/code&gt;
limit. The effectiveness of the attack depends on a number of factors (e.g.
query load, query patterns), but since the default value of the
&lt;code&gt;max-cache-size&lt;/code&gt; statement is 90%, in the worst case, the attacker can exhaust
all available memory on the host running &lt;code&gt;named&lt;/code&gt;, leading to a
denial-of-service condition.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-897-1 python-werkzeug security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-897-1-python-werkzeug/</link>
      <pubDate>Tue, 25 Jul 2023 08:36:06 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-897-1-python-werkzeug/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-897-1-python-werkzeug/">
      
&lt;p&gt;Package : python-werkzeug&lt;/p&gt;


&lt;p&gt;Version : 0.9.6&amp;#43;dfsg-1&amp;#43;deb8u3 (jessie), 0.11.15&amp;#43;dfsg1-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23934&#34;&gt;CVE-2023-23934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25577&#34;&gt;CVE-2023-25577&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in Werkzeug, a comprehensive WSGI web application library written in python.&lt;/p&gt;
&lt;p&gt;CVE-2023-23934:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Werkzeug will parse the cookie `=__Host-test=bad` as
`__Host-test=bad`. If a Werkzeug application is running next to a
vulnerable or malicious subdomain which sets such a cookie using a
vulnerable browser, the Werkzeug application will see the bad cookie
value but the valid cookie key. Browsers may allow &amp;quot;nameless&amp;quot; cookies
that look like `=value` instead of `key=value`. A vulnerable browser
may allow a compromised application on an adjacent subdomain to
exploit this to set a cookie like `=__Host-test=bad` for another
subdomain.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25577:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Werkzeug&#39;s multipart form data parser will parse an
unlimited number of parts, including file parts. Parts can be a small
amount of bytes, but each requires CPU time to parse and may use more
memory as Python data. If a request can be made to an endpoint that
accesses `request.data`, `request.form`, `request.files`, or
`request.get_data(parse_form_data=False)`, it can cause unexpectedly
high resource usage. This allows an attacker to cause a denial of
service by sending crafted multipart data to an endpoint that will
parse it.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-896-1 twisted security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-896-1-twisted/</link>
      <pubDate>Sat, 22 Jul 2023 18:08:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-896-1-twisted/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-896-1-twisted/">
      
&lt;p&gt;Package : twisted&lt;/p&gt;


&lt;p&gt;Version : 14.0.2-3&amp;#43;deb8u6 (jessie), 16.6.0-2&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12387&#34;&gt;CVE-2019-12387&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12855&#34;&gt;CVE-2019-12855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39348&#34;&gt;CVE-2022-39348&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Twisted, an event-based
framework for internet applications written in Python. An attacker may
initiate request smuggling, Man-In-The-Middle (MITM) communication
interception and cross-site-scripting (XSS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-12387&lt;/p&gt;
&lt;p&gt;twisted.web did not validate or sanitize URIs or HTTP methods,
allowing an attacker to inject invalid characters such as CRLF.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-12855&lt;/p&gt;
&lt;p&gt;In words.protocols.jabber.xmlstream in Twisted through 19.2.1,
XMPP support did not verify certificates when used with TLS,
allowing an attacker to MITM connections.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39348&lt;/p&gt;
&lt;p&gt;When the host header does not match a configured host
&lt;code&gt;twisted.web.vhost.NameVirtualHost&lt;/code&gt; will return a &lt;code&gt;NoResource&lt;/code&gt;
resource which renders the Host header unescaped into the 404
response allowing HTML and script injection. In practice this
should be very difficult to exploit as being able to modify the
Host header of a normal HTTP request implies that one is already
in a privileged position.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-895-1 netty-3.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-895-1-netty-3.9/</link>
      <pubDate>Sun, 16 Jul 2023 18:45:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-895-1-netty-3.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-895-1-netty-3.9/">
      
&lt;p&gt;Package : netty-3.9&lt;/p&gt;


&lt;p&gt;Version : 3.9.9.Final-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21290&#34;&gt;CVE-2021-21290&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an insecure temporary file issue that could
have lead to disclosure of arbitrary local files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-894-1 python-git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-894-1-python-git/</link>
      <pubDate>Sat, 15 Jul 2023 19:51:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-894-1-python-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-894-1-python-git/">
      
&lt;p&gt;Package : python-git&lt;/p&gt;


&lt;p&gt;Version : 2.1.1-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24439&#34;&gt;CVE-2022-24439&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;python-git, a Python library to interact with Git repositories, is
vulnerable to shell injection due to improper user input validation,
which makes it possible to inject a maliciously crafted remote URL
into the clone command.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-893-1 pypdf2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-893-1-pypdf2/</link>
      <pubDate>Fri, 14 Jul 2023 23:43:15 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-893-1-pypdf2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-893-1-pypdf2/">
      
&lt;p&gt;Package : pypdf2&lt;/p&gt;


&lt;p&gt;Version : 1.26.0-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36810&#34;&gt;CVE-2023-36810&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Quadratic runtime with malformed PDFs missing xref marker has been fixed
in PyPDF2, a pure Python PDF library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-892-1 yajl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-892-1-yajl/</link>
      <pubDate>Tue, 11 Jul 2023 18:56:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-892-1-yajl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-892-1-yajl/">
      
&lt;p&gt;Package : yajl&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-2&amp;#43;deb8u2 (jessie), 2.1.0-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16516&#34;&gt;CVE-2017-16516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24795&#34;&gt;CVE-2022-24795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-33460&#34;&gt;CVE-2023-33460&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties have been found in yajl, a JSON parser / small
validating JSON generator# written in ANSI C, which potentially can
cause memory corruption or DoS.&lt;/p&gt;
&lt;p&gt;The CVE-20117-16516 had been addressed already in ELA-888-1, however
the fix has been found to be incomplete as it missed an additional memory leak.
This update fixes that problem.&lt;/p&gt;
&lt;p&gt;CVE-2017-16516&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When a crafted JSON file is supplied to yajl, the process might
crash with a SIGABRT in the yajl_string_decode function in 
yajl_encode.c. This results potentially in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The 1.x branch and the 2.x branch of `yajl` contain an integer overflow
which leads to subsequent heap memory corruption when dealing with large
(~2GB) inputs.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-33460&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There&#39;s a memory leak in yajl 2.1.0 with use of yajl_tree_parse function,
which potentially cause out-of-memory in server and cause crash.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-891-1 nsis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-891-1-nsis/</link>
      <pubDate>Tue, 11 Jul 2023 09:00:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-891-1-nsis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-891-1-nsis/">
      
&lt;p&gt;Package : nsis&lt;/p&gt;


&lt;p&gt;Version : 2.51-1&amp;#43;deb9u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-37378&#34;&gt;CVE-2023-37378&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the Nullsoft Scriptable Install System (NSIS)
before version 3.09 mishandles access control for the uninstaller
directory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-890-1 php-cas security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-890-1-php-cas/</link>
      <pubDate>Sun, 09 Jul 2023 17:55:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-890-1-php-cas/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-890-1-php-cas/">
      
&lt;p&gt;Package : php-cas&lt;/p&gt;


&lt;p&gt;Version : 1.3.3-4&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-1000071&#34;&gt;CVE-2017-1000071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39369&#34;&gt;CVE-2022-39369&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities has been found in phpCAS, a Central Authentication
Service client library in php, which may allow an attacker to gain
access to a victim&amp;rsquo;s account on a vulnerable CASified service without
victim&amp;rsquo;s knowledge, when the victim visits attacker&amp;rsquo;s website while
being logged in to the same CAS server and an possible
authentication bypass vulnerability, if used with an vulnerable CAS
server suspectible to XML injection.&lt;/p&gt;
&lt;p&gt;The fix for this vulnerabilty requires an API breaking change in php-cas
and will require that software using the library be updated.&lt;/p&gt;
&lt;p&gt;The only package depending on php-cas in stretch, package fusiondirectory,
is not supported by ELTS und therefore has not been updated. It will
stop working if configured to use CAS.&lt;/p&gt;
&lt;p&gt;For software using php-cas, please see the upstream instructions how to
update this software [1]:&lt;/p&gt;
&lt;p&gt;phpCAS now requires an additional service base URL argument when constructing
the client class. It accepts any argument of:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;A service base URL string. The service URL discovery will always use this
server name (protocol, hostname and port number) without using any external
host names.&lt;/li&gt;
&lt;li&gt;An array of service base URL strings. The service URL discovery will check
against this list before using the auto discovered base URL. If there is no
match, the first base URL in the array will be used as the default. This
option is helpful if your PHP website is accessible through multiple domains
without a canonical name, or through both HTTP and HTTPS.&lt;/li&gt;
&lt;li&gt;A class that implements CAS_ServiceBaseUrl_Interface. If you need to
customize the base URL discovery behavior, you can pass in a class that
implements the interface.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Constructing the client class is usually done with phpCAS::client().&lt;/p&gt;
&lt;p&gt;For example, using the first possiblity:&lt;br&gt;
&lt;code&gt;phpCAS::client(CAS_VERSION_2_0, $cas_host, $cas_port, $cas_context);&lt;/code&gt;&lt;br&gt;
could become:&lt;br&gt;
&lt;code&gt;phpCAS::client(CAS_VERSION_2_0, $cas_host, $cas_port, $cas_context, &amp;quot;https://casified-service.example.org:8080&amp;quot;);&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Details of the vulnerabilities:&lt;/p&gt;
&lt;p&gt;CVE-2022-39369&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The phpCAS library uses HTTP headers to determine the service URL used
to validate tickets. This allows an attacker to control the host header
and use a valid ticket granted for any authorized service in the same
SSO realm (CAS server) to authenticate to the service protected by
phpCAS.  Depending on the settings of the CAS server service registry in
worst case this may be any other service URL (if the allowed URLs are
configured to &amp;quot;^(https)://.*&amp;quot;) or may be strictly limited to known and
authorized services in the same SSO federation if proper URL service
validation is applied.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-1000071&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jasig phpCAS version 1.3.4 is vulnerable to an authentication bypass 
in the validateCAS20 function when configured to authenticate
against an old CAS server (which needs to be suspectible to XML tag)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;[1] &lt;a href=&#34;https://github.com/apereo/phpCAS/blob/f3db27efd1f5020e71f2116f637a25cc9dbda1e3/docs/Upgrading#L1C1-L1C1&#34;&gt;https://github.com/apereo/phpCAS/blob/f3db27efd1f5020e71f2116f637a25cc9dbda1e3/docs/Upgrading#L1C1-L1C1&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-889-1 dpdk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-889-1-dpdk/</link>
      <pubDate>Sat, 08 Jul 2023 18:31:04 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-889-1-dpdk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-889-1-dpdk/">
      
&lt;p&gt;Package : dpdk&lt;/p&gt;


&lt;p&gt;Version : 16.11.11-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2132&#34;&gt;CVE-2022-2132&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow was discovered in the vhost code of DPDK, a set of libraries
for fast packet processing, which could result in denial of service or the
execution of arbitrary code by malicious guests/containers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-883-2 c-ares regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-883-2-c-ares/</link>
      <pubDate>Tue, 04 Jul 2023 21:06:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-883-2-c-ares/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-883-2-c-ares/">
      
&lt;p&gt;Package : c-ares&lt;/p&gt;


&lt;p&gt;Version : 1.10.0-2&amp;#43;deb8u6 (jessie), 1.12.0-1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


      &lt;p&gt;The previous security update of c-ares, issued as ELA-883-1, causes a regression
on both Jessie and Stretch suites.&lt;/p&gt;
&lt;p&gt;This update fixes this regression.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-888-1 yajl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-888-1-yajl/</link>
      <pubDate>Sat, 01 Jul 2023 11:58:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-888-1-yajl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-888-1-yajl/">
      
&lt;p&gt;Package : yajl&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-2&amp;#43;deb8u1 (jessie), 2.1.0-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-33460&#34;&gt;CVE-2023-33460&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A memory leak has been found in yajl, a JSON parser / small validating JSON generator
written in ANSI C, which might allow an attacker to cause an out of memory situation
and potentially causing a crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-887-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-887-1-cups/</link>
      <pubDate>Sat, 01 Jul 2023 00:33:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-887-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-887-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.7.5-11&amp;#43;deb8u11 (jessie), 2.2.1-8&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-34241&#34;&gt;CVE-2023-34241&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in cups, the Common UNIX Printing System(tm).
Due to a use-after-free bug an attacker could cause a denial-of-service.
In case of having access to the log files, an attacker could also
exfiltrate private keys or other sensitive information from the cups
daemon.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-886-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-886-1-ffmpeg/</link>
      <pubDate>Fri, 30 Jun 2023 23:52:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-886-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-886-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3109&#34;&gt;CVE-2022-3109&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3341&#34;&gt;CVE-2022-3341&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two null pointer dereferences have been fixed in the FFmpeg multimedia framework.&lt;/p&gt;
&lt;p&gt;CVE-2022-3109&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Null pointer dereference in vp3_decode_frame()
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3341&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Null pointer dereference in nutdec.c
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-885-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-885-1-python3.4/</link>
      <pubDate>Fri, 30 Jun 2023 23:51:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-885-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-885-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u15 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-20107&#34;&gt;CVE-2015-20107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45061&#34;&gt;CVE-2022-45061&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were fixed in the Python3 interpreter.&lt;/p&gt;
&lt;p&gt;CVE-2015-20107&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The mailcap module did not add escape characters into commands discovered in the system mailcap file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-45061&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Quadratic time in the IDNA decoder.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-884-1 python3.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-884-1-python3.5/</link>
      <pubDate>Fri, 30 Jun 2023 23:51:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-884-1-python3.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-884-1-python3.5/">
      
&lt;p&gt;Package : python3.5&lt;/p&gt;


&lt;p&gt;Version : 3.5.3-1&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-20107&#34;&gt;CVE-2015-20107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4189&#34;&gt;CVE-2021-4189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45061&#34;&gt;CVE-2022-45061&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were fixed in the Python3 interpreter.&lt;/p&gt;
&lt;p&gt;CVE-2015-20107&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The mailcap module did not add escape characters into commands discovered in the system mailcap file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-4189&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Make ftplib not trust the PASV response.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-45061&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Quadratic time in the IDNA decoder.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-883-1 c-ares security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-883-1-c-ares/</link>
      <pubDate>Fri, 30 Jun 2023 23:05:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-883-1-c-ares/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-883-1-c-ares/">
      
&lt;p&gt;Package : c-ares&lt;/p&gt;


&lt;p&gt;Version : 1.10.0-2&amp;#43;deb8u5 (jessie), 1.12.0-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31130&#34;&gt;CVE-2023-31130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32067&#34;&gt;CVE-2023-32067&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in c-ares, an asynchronous name
resolver library:&lt;/p&gt;
&lt;p&gt;CVE-2023-31130&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ares_inet_net_pton() is found to be vulnerable to a buffer underflow
for certain ipv6 addresses, in particular &amp;quot;0::00:00:00/2&amp;quot; was found
to cause an issue. c-ares only uses this function internally for
configuration purposes, however external usage for other purposes may
cause more severe issues.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32067&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Target resolver may erroneously interprets a malformed UDP packet
with a length of 0 as a graceful shutdown of the connection, which
could cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-882-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-882-1-postgresql-9.4/</link>
      <pubDate>Thu, 29 Jun 2023 20:43:30 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-882-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-882-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2454&#34;&gt;CVE-2023-2454&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an attacker with elevated database-level privileges to execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-881-1 libx11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-881-1-libx11/</link>
      <pubDate>Thu, 29 Jun 2023 14:57:16 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-881-1-libx11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-881-1-libx11/">
      
&lt;p&gt;Package : libx11&lt;/p&gt;


&lt;p&gt;Version : 2:1.6.2-3&amp;#43;deb8u6 (jessie), 2:1.6.4-3&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3138&#34;&gt;CVE-2023-3138&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Missing input validation in various functions may have resulted in
denial of service in various functions provided by libx11, the X11
client-side library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-880-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-880-1-postgresql-9.6/</link>
      <pubDate>Wed, 28 Jun 2023 21:14:33 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-880-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-880-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2454&#34;&gt;CVE-2023-2454&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2455&#34;&gt;CVE-2023-2455&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2023-2454:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an attacker with elevated database-level privileges to execute arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2455:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-879-1 lua5.3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-879-1-lua5.3/</link>
      <pubDate>Mon, 26 Jun 2023 10:10:31 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-879-1-lua5.3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-879-1-lua5.3/">
      
&lt;p&gt;Package : lua5.3&lt;/p&gt;


&lt;p&gt;Version : 5.3.3-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-6706&#34;&gt;CVE-2019-6706&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A use after free was found in lua 5.3. A crash might be triggered by a debug.upvaluejoin call with specially crafted parameters.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-878-1 libwebp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-878-1-libwebp/</link>
      <pubDate>Mon, 26 Jun 2023 11:28:39 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-878-1-libwebp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-878-1-libwebp/">
      
&lt;p&gt;Package : libwebp&lt;/p&gt;


&lt;p&gt;Version : 0.5.2-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1999&#34;&gt;CVE-2023-1999&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Double free which may result in denial of service was fixed in
the libwebp image compression library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-877-1 xmltooling security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-877-1-xmltooling/</link>
      <pubDate>Fri, 23 Jun 2023 15:01:59 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-877-1-xmltooling/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-877-1-xmltooling/">
      
&lt;p&gt;Package : xmltooling&lt;/p&gt;


&lt;p&gt;Version : 1.5.3-2&amp;#43;deb8u5 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-36661&#34;&gt;CVE-2023-36661&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jurien de Jong discovered that the parsing of KeyInfo elements within the
XMLTooling library may result in server-side request forgery.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-876-1 hsqldb1.8.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-876-1-hsqldb1.8.0/</link>
      <pubDate>Wed, 21 Jun 2023 19:00:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-876-1-hsqldb1.8.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-876-1-hsqldb1.8.0/">
      
&lt;p&gt;Package : hsqldb1.8.0&lt;/p&gt;


&lt;p&gt;Version : 1.8.0.10&amp;#43;dfsg-7&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1183&#34;&gt;CVE-2023-1183&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Gregor Kopf of Secfault Security GmbH discovered that HSQLDB, a Java SQL
database engine, allowed the execution of spurious scripting commands in
.script and .log files. Hsqldb supports a &amp;ldquo;SCRIPT&amp;rdquo; keyword which is normally
used to record the commands input by the database admin to output such a
script. In combination with LibreOffice, an attacker could craft an odb
containing a &amp;ldquo;database/script&amp;rdquo; file which itself contained a SCRIPT command
where the contents of the file could be written to a new file whose location was
determined by the attacker.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-875-1 libxpm security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-875-1-libxpm/</link>
      <pubDate>Tue, 20 Jun 2023 20:11:42 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-875-1-libxpm/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-875-1-libxpm/">
      
&lt;p&gt;Package : libxpm&lt;/p&gt;


&lt;p&gt;Version : 1:3.5.12-0&amp;#43;deb8u2 (jessie), 1:3.5.12-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4883&#34;&gt;CVE-2022-4883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44617&#34;&gt;CVE-2022-44617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46285&#34;&gt;CVE-2022-46285&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in libxpm, a library handling X PixMap image format (so called xpm files).
xpm files are an extension of the monochrome X BitMap format specified in the X protocol, and are commonly used in traditional X applications.&lt;/p&gt;
&lt;p&gt;CVE-2022-4883&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-46285&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When parsing a file with a comment not closed an end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-873-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-873-1-php7.0/</link>
      <pubDate>Tue, 20 Jun 2023 19:50:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-873-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-873-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u15 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-3247&#34;&gt;CVE-2023-3247&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Niels Dossche and Tim Düsterhus discovered that PHP&amp;rsquo;s implementation of the
SOAP HTTP Digest authentication used an insufficient number of random bytes.
This would affect PHP applications that use SOAP with HTTP Digest
authentication against a possibly malicious server over HTTP.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-872-1 libfastjson security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-872-1-libfastjson/</link>
      <pubDate>Tue, 20 Jun 2023 19:42:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-872-1-libfastjson/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-872-1-libfastjson/">
      
&lt;p&gt;Package : libfastjson&lt;/p&gt;


&lt;p&gt;Version : 0.99.4-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12762&#34;&gt;CVE-2020-12762&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libfastjson, a fast json library for C.
Due to missing checks, out-of-bounds write might happen when parsing large JSON files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-874-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-874-1-glibc/</link>
      <pubDate>Tue, 20 Jun 2023 14:21:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-874-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-874-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.19-18&amp;#43;deb8u12 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-20109&#34;&gt;CVE-2015-20109&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes a denial of service condition in fnmatch. This is a variant
of CVE-2015-8984, which has been associated with
&lt;a href=&#34;https://sourceware.org/bugzilla/show_bug.cgi?id=18032&#34;&gt;BZ#18032&lt;/a&gt;. This variant
is reported as
&lt;a href=&#34;https://sourceware.org/bugzilla/show_bug.cgi?id=18036&#34;&gt;BZ#18036&lt;/a&gt;, but has not
been fixed together with the original problem.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-871-1 sqlparse security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-871-1-sqlparse/</link>
      <pubDate>Mon, 19 Jun 2023 17:50:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-871-1-sqlparse/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-871-1-sqlparse/">
      
&lt;p&gt;Package : sqlparse&lt;/p&gt;


&lt;p&gt;Version : 0.2.2-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-30608&#34;&gt;CVE-2023-30608&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Erik Krogh Kristensen discovered that sqlparse, a non-validating SQL parser,
contained a regular expression that is vulnerable to ReDoS (Regular Expression
Denial of Service).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-870-1 requests security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-870-1-requests/</link>
      <pubDate>Sun, 18 Jun 2023 19:56:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-870-1-requests/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-870-1-requests/">
      
&lt;p&gt;Package : requests&lt;/p&gt;


&lt;p&gt;Version : 2.4.3-6&amp;#43;deb8u1 (jessie), 2.12.4-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32681&#34;&gt;CVE-2023-32681&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Requests, a Python HTTP library, has been leaking Proxy-Authorization headers
to destination servers when redirected to an HTTPS endpoint. For HTTP
connections sent through the tunnel, the proxy will identify the header in the
request itself and remove it prior to forwarding to the destination server.
However when sent over HTTPS, the &lt;code&gt;Proxy-Authorization&lt;/code&gt; header must be sent in
the CONNECT request as the proxy has no visibility into the tunneled request.
This results in Requests forwarding proxy credentials to the destination
server unintentionally, allowing a malicious actor to potentially exfiltrate
sensitive information.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-869-1 php-phpseclib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-869-1-php-phpseclib/</link>
      <pubDate>Sat, 17 Jun 2023 19:19:13 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-869-1-php-phpseclib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-869-1-php-phpseclib/">
      
&lt;p&gt;Package : php-phpseclib&lt;/p&gt;


&lt;p&gt;Version : 2.0.4-1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30130&#34;&gt;CVE-2021-30130&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that php-phpseclib, a pure-PHP implementation of various cryptographic and arithmetic algorithms, mishandles RSA PKCS#1 v1.5 signature verification. An attacker may get invalid signatures accepted, bypassing authorization control in specific situations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-868-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-868-1-exim4/</link>
      <pubDate>Mon, 12 Jun 2023 06:00:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-868-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-868-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.84.2-2&amp;#43;deb8u10 (jessie), 4.89-2&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38371&#34;&gt;CVE-2021-38371&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in Exim, a Mail Transport Agent (MTA). The STARTTLS feature in
Exim allows response injection (buffering) during MTA SMTP sending. The program
will fail with an appropriate error message if such a behavior is detected now.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-867-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-867-1-vim/</link>
      <pubDate>Mon, 12 Jun 2023 05:58:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-867-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-867-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u10 (jessie), 2:8.0.0197-4&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4141&#34;&gt;CVE-2022-4141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0054&#34;&gt;CVE-2023-0054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1175&#34;&gt;CVE-2023-1175&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2610&#34;&gt;CVE-2023-2610&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in vim, an enhanced vi
editor. Buffer overflows and out-of-bounds reads may lead to a
denial-of-service (application crash) or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-866-1 sysstat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-866-1-sysstat/</link>
      <pubDate>Thu, 08 Jun 2023 13:37:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-866-1-sysstat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-866-1-sysstat/">
      
&lt;p&gt;Package : sysstat&lt;/p&gt;


&lt;p&gt;Version : 11.0.1-1&amp;#43;deb8u2 (jessie), 11.4.3-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-33204&#34;&gt;CVE-2023-33204&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that sysstat, a system performance tools for Linux,
incompletely fixed CVE-2022-39377 (as published in ELA-731-1), which
could lead to crashes and possibly remote code execution.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2023-33204&lt;/p&gt;
&lt;p&gt;sysstat allows a multiplication integer overflow in check_overflow
in common.c. NOTE: this issue exists because of an incomplete fix
for CVE-2022-39377.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For reference, the initial vulnerability was:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-39377&lt;/p&gt;
&lt;p&gt;On 32 bit systems, allocate_structures contains a size_t overflow
in sa_common.c. The allocate_structures function insufficiently
checks bounds before arithmetic multiplication, allowing for an
overflow in the size allocated for the buffer representing system
activities. This issue may lead to Remote Code Execution (RCE).&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-865-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-865-1-imagemagick/</link>
      <pubDate>Wed, 07 Jun 2023 10:31:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-865-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-865-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u26 (jessie), 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12670&#34;&gt;CVE-2017-12670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10804&#34;&gt;CVE-2018-10804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20309&#34;&gt;CVE-2021-20309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32545&#34;&gt;CVE-2022-32545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32546&#34;&gt;CVE-2022-32546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32547&#34;&gt;CVE-2022-32547&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been addressed in imagemagick, an image processing toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2017-12670&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A missing validation was found in coders/mat.c, leading to an assertion failure in the function DestroyImage in MagickCore/image.c, which allows attackers to cause a denial of service. This fix was only applied for  Debian 9 stretch. Debian 8 jessie was previously fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10804&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak in WriteTIFFImage (coders/tiff.c) was fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20309&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A division by zero in WaveImage() was fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-32545&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An undefined behavior due to conversion to outside the range of long was fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-32546&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An unaligned access in magick/property.c was fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-32547&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An undefined behavior due to conversion to outside the range of representable values of type &#39;unsigned char&#39;.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-864-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-864-1-linux-5.10/</link>
      <pubDate>Wed, 07 Jun 2023 09:10:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-864-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-864-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.179-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0386&#34;&gt;CVE-2023-0386&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-31436&#34;&gt;CVE-2023-31436&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32233&#34;&gt;CVE-2023-32233&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2023-0386&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that under certain conditions the overlayfs
filesystem implementation did not properly handle copy up
operations. A local user permitted to mount overlay mounts in user
namespaces can take advantage of this flaw for local privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-31436&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gwangun Jung reported a a flaw causing heap out-of-bounds
read/write errors in the traffic control subsystem for the Quick
Fair Queueing scheduler (QFQ) which may result in information
leak, denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-32233&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Patryk Sondej and Piotr Krysiuk discovered a use-after-free flaw
in the Netfilter nf_tables implementation when processing batch
requests, which may result in local privilege escalation for a
user with the CAP_NET_ADMIN capability in any user or network
namespace.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-863-1 cpio security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-863-1-cpio/</link>
      <pubDate>Mon, 05 Jun 2023 01:38:06 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-863-1-cpio/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-863-1-cpio/">
      
&lt;p&gt;Package : cpio&lt;/p&gt;


&lt;p&gt;Version : 2.11&amp;#43;dfsg-4.1&amp;#43;deb8u4 (jessie), 2.11&amp;#43;dfsg-6&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14866&#34;&gt;CVE-2019-14866&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38185&#34;&gt;CVE-2021-38185&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Improper validation of input was fixed in GNU cpio, a program to manage
archives of files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-862-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-862-1-wireshark/</link>
      <pubDate>Sat, 03 Jun 2023 23:54:12 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-862-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-862-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 2.6.20-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2856&#34;&gt;CVE-2023-2856&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2858&#34;&gt;CVE-2023-2858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2879&#34;&gt;CVE-2023-2879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2952&#34;&gt;CVE-2023-2952&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were fixed in the network traffic analyzer Wireshark.&lt;/p&gt;
&lt;p&gt;CVE-2023-2856&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;VMS TCPIPtrace file parser crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2858&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NetScaler file parser crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2879&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GDSDB infinite loop
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2952&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XRA dissector infinite loop
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-861-1 emacs24 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-861-1-emacs24/</link>
      <pubDate>Sat, 03 Jun 2023 02:33:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-861-1-emacs24/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-861-1-emacs24/">
      
&lt;p&gt;Package : emacs24&lt;/p&gt;


&lt;p&gt;Version : 24.4&amp;#43;1-5&amp;#43;deb8u2 (jessie), 24.5&amp;#43;1-11&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48339&#34;&gt;CVE-2022-48339&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28617&#34;&gt;CVE-2023-28617&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Xi Lu discovered that missing input sanitizing in Emacs could result in the
execution of arbitrary shell commands.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-860-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-860-1-cups/</link>
      <pubDate>Thu, 01 Jun 2023 12:14:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-860-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-860-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.7.5-11&amp;#43;deb8u10 (jessie), 2.2.1-8&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-32324&#34;&gt;CVE-2023-32324&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in cups, the Common UNIX Printing System.
Due to a buffer overflow vulnerability in the function format_log_line()
a remote attackers could cause a denial-of-service(DoS). The vulnerability
can be triggered when the configuration file cupsd.conf sets the value of
&amp;ldquo;loglevel&amp;rdquo; to &amp;ldquo;DEBUG&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-859-1 python-ipaddress security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-859-1-python-ipaddress/</link>
      <pubDate>Tue, 30 May 2023 11:40:21 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-859-1-python-ipaddress/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-859-1-python-ipaddress/">
      
&lt;p&gt;Package : python-ipaddress&lt;/p&gt;


&lt;p&gt;Version : 1.0.17-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14422&#34;&gt;CVE-2020-14422&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential denial of service (DoS) vulnerability was discovered in
&lt;code&gt;python-ipaddress&lt;/code&gt;, a backport of Python 3&amp;rsquo;s &lt;code&gt;ipaddress&lt;/code&gt; module for creating
and manipulating IPv4 and IPv6 internet addresses (eg.  &lt;code&gt;127.0.0.1&lt;/code&gt;).&lt;/p&gt;
&lt;p&gt;This was caused by improperly computing hash values in the &lt;code&gt;IPv4Interface&lt;/code&gt; and
&lt;code&gt;IPv6Interface&lt;/code&gt; classes: if an application was affected by the performance of a
dictionary containing &lt;code&gt;IPv4Interface&lt;/code&gt; or &lt;code&gt;IPv6Interface&lt;/code&gt; objects, an attacker
could have caused many dictionary entries to be created.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-858-1 emacs25 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-858-1-emacs25/</link>
      <pubDate>Tue, 30 May 2023 00:56:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-858-1-emacs25/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-858-1-emacs25/">
      
&lt;p&gt;Package : emacs25&lt;/p&gt;


&lt;p&gt;Version : 25.1&amp;#43;1-4&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45939&#34;&gt;CVE-2022-45939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48337&#34;&gt;CVE-2022-48337&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48339&#34;&gt;CVE-2022-48339&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28617&#34;&gt;CVE-2023-28617&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Xi Lu discovered that missing input sanitizing in Emacs could result in the
execution of arbitrary shell commands.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-857-1 libtasn1-6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-857-1-libtasn1-6/</link>
      <pubDate>Sat, 27 May 2023 19:26:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-857-1-libtasn1-6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-857-1-libtasn1-6/">
      
&lt;p&gt;Package : libtasn1-6&lt;/p&gt;


&lt;p&gt;Version : 4.2-3&amp;#43;deb8u5 (jessie), 4.10-1.1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46848&#34;&gt;CVE-2021-46848&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an off-by-one array size issue in
libtasn1-6, a library to manage the generic ASN.1 data structure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-856-1 freetype security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-856-1-freetype/</link>
      <pubDate>Sat, 27 May 2023 18:18:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-856-1-freetype/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-856-1-freetype/">
      
&lt;p&gt;Package : freetype&lt;/p&gt;


&lt;p&gt;Version : 2.5.2-3&amp;#43;deb8u6 (jessie), 2.6.3-3.2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27405&#34;&gt;CVE-2022-27405&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27406&#34;&gt;CVE-2022-27406&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in freetype, a FreeType 2 font engine.
Both issues are related to segmentation violations in different functions: ft_open_face_internal() and FT_Request_Size().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-855-1 bzip2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-855-1-bzip2/</link>
      <pubDate>Fri, 26 May 2023 16:34:10 -0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-855-1-bzip2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-855-1-bzip2/">
      
&lt;p&gt;Package : bzip2&lt;/p&gt;


&lt;p&gt;Version : 1.0.6-8.1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12900&#34;&gt;CVE-2019-12900&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been fixed in bzip2, a high-quality block-sorting file
compressor. CVE-2019-12900 is a out-of-bounds write when using a crafted
compressed file.&lt;/p&gt;
&lt;p&gt;This vulnerability was fixed in Debian Jessie, with bzip2 version
1.0.6-4+deb7u1&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-854-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-854-1-openjdk-8/</link>
      <pubDate>Fri, 26 May 2023 10:34:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-854-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-854-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u372-ga-1~deb8u1 (jessie), 8u372-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21930&#34;&gt;CVE-2023-21930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21937&#34;&gt;CVE-2023-21937&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21938&#34;&gt;CVE-2023-21938&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21939&#34;&gt;CVE-2023-21939&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21954&#34;&gt;CVE-2023-21954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21967&#34;&gt;CVE-2023-21967&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21968&#34;&gt;CVE-2023-21968&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in information disclosure or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-853-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-853-1-python2.7/</link>
      <pubDate>Thu, 25 May 2023 11:42:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-853-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-853-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1-1&amp;#43;deb8u10 (jessie), 2.7.13-2&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-20107&#34;&gt;CVE-2015-20107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8492&#34;&gt;CVE-2020-8492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26116&#34;&gt;CVE-2020-26116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3733&#34;&gt;CVE-2021-3733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3737&#34;&gt;CVE-2021-3737&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45061&#34;&gt;CVE-2022-45061&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Python, an interactive
high-level object-oriented language. An attacker may cause command
injection, denial of service (DoS) and request smuggling.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2015-20107&lt;/p&gt;
&lt;p&gt;The mailcap module does not add escape characters into commands
discovered in the system mailcap file. This may allow attackers to
inject shell commands into applications that call
mailcap.findmatch with untrusted input (if they lack validation of
user-provided filenames or arguments).
Note: this CVE was really issued in 2022.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-8492&lt;/p&gt;
&lt;p&gt;Python allows an HTTP server to conduct Regular Expression Denial
of Service (ReDoS) attacks against a client because of
urllib.request.AbstractBasicAuthHandler catastrophic backtracking.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-26116&lt;/p&gt;
&lt;p&gt;http.client allows CRLF injection if the attacker controls the
HTTP request method, as demonstrated by inserting CR and LF
control characters in the first argument of
HTTPConnection.request.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-3733&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s a flaw in urllib&amp;rsquo;s AbstractBasicAuthHandler class. An
attacker who controls a malicious HTTP server that an HTTP client
(such as web browser) connects to, could trigger a Regular
Expression Denial of Service (ReDOS) during an authentication
request with a specially crafted payload that is sent by the
server to the client.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-3737&lt;/p&gt;
&lt;p&gt;An improperly handled HTTP response in the HTTP client code of
python may allow a remote attacker, who controls the HTTP server,
to make the client script enter an infinite loop, consuming CPU
time.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-45061&lt;/p&gt;
&lt;p&gt;An unnecessary quadratic algorithm exists in one path when
processing some inputs to the IDNA (RFC 3490) decoder, such that a
crafted, unreasonably long name being presented to the decoder
could lead to a CPU denial of service.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This update also brings improved fixes for CVE-2019-10160
(ELA-134-1,DLA-2280-1) and CVE-2021-3177 (ELA-598-1,DLA-2919-1), and
drop the patch for CVE-2019-9740/CVE-2019-9947 (DLA-1834-1,DLA-2337-1)
whose issue was introduced later in the 2.7.x series.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-852-1 cups-filters security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-852-1-cups-filters/</link>
      <pubDate>Mon, 22 May 2023 11:18:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-852-1-cups-filters/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-852-1-cups-filters/">
      
&lt;p&gt;Package : cups-filters&lt;/p&gt;


&lt;p&gt;Version : 1.11.6-3&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24805&#34;&gt;CVE-2023-24805&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that missing input sanitising in cups-filters, when
using the Backend Error Handler (beh) backend to create an accessible
network printer, may result in the execution of arbitrary commands.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-851-1 uwsgi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-851-1-uwsgi/</link>
      <pubDate>Sat, 20 May 2023 08:08:27 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-851-1-uwsgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-851-1-uwsgi/">
      
&lt;p&gt;Package : uwsgi&lt;/p&gt;


&lt;p&gt;Version : 2.0.14&amp;#43;20161117-3&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27522&#34;&gt;CVE-2023-27522&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A HTTP Response Smuggling vulnerability was fixed mod_proxy_uwsgi
apache module included in uwsgi package. Special characters in the
origin response header can truncate/split the response forwarded to
the client.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-850-1 sqlite security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-850-1-sqlite/</link>
      <pubDate>Sat, 13 May 2023 13:08:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-850-1-sqlite/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-850-1-sqlite/">
      
&lt;p&gt;Package : sqlite&lt;/p&gt;


&lt;p&gt;Version : 2.8.17-12&amp;#43;deb8u1 (jessie), 2.8.17-14&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-6153&#34;&gt;CVE-2016-6153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8740&#34;&gt;CVE-2018-8740&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been fixed in sqlite (V2) which which might allow
local users to obtain sensitive information, cause a denial of service
(application crash), or have unspecified other impact.&lt;/p&gt;
&lt;p&gt;CVE-2016-6153&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sqlite improperly implemented the temporary directory search algorithm, which
might allow local users to obtain sensitive information, cause a denial of
service (application crash), or have unspecified other impact by leveraging use
of the current working directory for temporary files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-8740&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Databases whose schema is corrupted using a CREATE TABLE AS statement could
cause a NULL pointer dereference,
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-849-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-849-1-php5/</link>
      <pubDate>Sat, 13 May 2023 07:20:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-849-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-849-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u17 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31631&#34;&gt;CVE-2022-31631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0567&#34;&gt;CVE-2023-0567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0568&#34;&gt;CVE-2023-0568&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0662&#34;&gt;CVE-2023-0662&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language, which could result in denial of
service or incorrect validation of BCrypt hashes.&lt;/p&gt;
&lt;p&gt;CVE-2022-31631&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to an uncaught integer overflow, `PDO::quote()` of PDO_SQLite
may return an improperly quoted string.  The exact details likely
depend on the implementation of `sqlite3_snprintf()`, but with some
versions it is possible to force the function to return a single
apostrophe, if the function is called on user supplied input without
any length restrictions in place.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0567&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tim Düsterhus discovered that malformed BCrypt hashes that include a
`$` within their salt part trigger a buffer overread and may
erroneously validate any password as valid.  (`Password_verify()`
always return `true` with such inputs.)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0568&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;1-byte array overrun when appending slash to paths during path
resolution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0662&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jakob Ackermann discovered a Denial of Service vulnerability when
parsing multipart request body: the request body parsing in PHP
allows any unauthenticated attacker to consume a large amount of CPU
time and trigger excessive logging.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-848-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-848-1-php7.0/</link>
      <pubDate>Sat, 13 May 2023 01:25:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-848-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-848-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u14 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31631&#34;&gt;CVE-2022-31631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0567&#34;&gt;CVE-2023-0567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0568&#34;&gt;CVE-2023-0568&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0662&#34;&gt;CVE-2023-0662&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language, which could result in denial of
service or incorrect validation of BCrypt hashes.&lt;/p&gt;
&lt;p&gt;CVE-2022-31631&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to an uncaught integer overflow, `PDO::quote()` of PDO_SQLite
may return an improperly quoted string.  The exact details likely
depend on the implementation of `sqlite3_snprintf()`, but with some
versions it is possible to force the function to return a single
apostrophe, if the function is called on user supplied input without
any length restrictions in place.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0567&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tim Düsterhus discovered that malformed BCrypt hashes that include a
`$` within their salt part trigger a buffer overread and may
erroneously validate any password as valid.  (`Password_verify()`
always return `true` with such inputs.)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0568&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;1-byte array overrun when appending slash to paths during path
resolution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0662&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jakob Ackermann discovered a Denial of Service vulnerability when
parsing multipart request body: the request body parsing in PHP
allows any unauthenticated attacker to consume a large amount of CPU
time and trigger excessive logging.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-847-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-847-1-linux-4.19/</link>
      <pubDate>Fri, 05 May 2023 19:04:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-847-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-847-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.282-1~deb8u1 (jessie), 4.19.282-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2873&#34;&gt;CVE-2022-2873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3424&#34;&gt;CVE-2022-3424&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3545&#34;&gt;CVE-2022-3545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3707&#34;&gt;CVE-2022-3707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4744&#34;&gt;CVE-2022-4744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36280&#34;&gt;CVE-2022-36280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41218&#34;&gt;CVE-2022-41218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45934&#34;&gt;CVE-2022-45934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47929&#34;&gt;CVE-2022-47929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0045&#34;&gt;CVE-2023-0045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0266&#34;&gt;CVE-2023-0266&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0394&#34;&gt;CVE-2023-0394&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0458&#34;&gt;CVE-2023-0458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0459&#34;&gt;CVE-2023-0459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0461&#34;&gt;CVE-2023-0461&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1073&#34;&gt;CVE-2023-1073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1074&#34;&gt;CVE-2023-1074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1078&#34;&gt;CVE-2023-1078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1079&#34;&gt;CVE-2023-1079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1118&#34;&gt;CVE-2023-1118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1281&#34;&gt;CVE-2023-1281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1513&#34;&gt;CVE-2023-1513&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1670&#34;&gt;CVE-2023-1670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1829&#34;&gt;CVE-2023-1829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1855&#34;&gt;CVE-2023-1855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1859&#34;&gt;CVE-2023-1859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1989&#34;&gt;CVE-2023-1989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1990&#34;&gt;CVE-2023-1990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1998&#34;&gt;CVE-2023-1998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2162&#34;&gt;CVE-2023-2162&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2194&#34;&gt;CVE-2023-2194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23454&#34;&gt;CVE-2023-23454&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23455&#34;&gt;CVE-2023-23455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23559&#34;&gt;CVE-2023-23559&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26545&#34;&gt;CVE-2023-26545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28328&#34;&gt;CVE-2023-28328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-30456&#34;&gt;CVE-2023-30456&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-30772&#34;&gt;CVE-2023-30772&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, or information
leak.&lt;/p&gt;
&lt;p&gt;CVE-2022-2873&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheyu Ma discovered that an out-of-bounds memory access flaw in
the Intel iSMT SMBus 2.0 host controller driver may result in
denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3424&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang and Zhuorao Yang reported a flaw in the SGI GRU driver
which could lead to a use-after-free.  On systems where this driver
is used, a local user can explit this for denial of service (crash
or memory corruption) or possibly for privilege escalation.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3545&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Netronome Flow Processor (NFP) driver
contained a use-after-free flaw in area_cache_get(), which may
result in denial of service or the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3707&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a flaw in the i915 graphics driver&#39;s
virtualisation (GVT-g) support that could lead to a double-free.
On systems where this feature is used, a guest can exploit this
for denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4744&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a flaw in the TUN/TAP network driver,
which can lead to a double-free.  A local user can exploit this
for denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36280&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds memory write vulnerability was discovered in the
vmwgfx driver, which may allow a local unprivileged user to cause
a denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hyunwoo Kim reported a use-after-free flaw in the Media DVB core
subsystem caused by refcount races, which may allow a local user
to cause a denial of service or escalate privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-45934&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow in l2cap_config_req() in the Bluetooth
subsystem was discovered, which may allow a physically proximate
attacker to cause a denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47929&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Frederick Lawler reported a NULL pointer dereference in the
traffic control subsystem allowing an unprivileged user to cause a
denial of service by setting up a specially crafted traffic
control configuration.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0045&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Rodrigo Branco and Rafael Correa De Ysasi reported that when a
user-space task told the kernel to enable Spectre v2 mitigation
for it, the mitigation was not enabled until the task was next
rescheduled.  This might be exploitable by a local or remote
attacker to leak sensitive information from such an application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0266&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw in the sound subsystem due to missing
locking may result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0394&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered a NULL pointer dereference flaw in
rawv6_push_pending_frames() in the network subsystem allowing a
local user to cause a denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0458&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jordy Zimmer and Alexandra Sandulescu found that getrlimit() and
related system calls were vulnerable to speculative execution
attacks such as Spectre v1.  A local user could explot this to
leak sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0459&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jordy Zimmer and Alexandra Sandulescu found a regression in
Spectre v1 mitigation in the user-copy functions for the amd64
(64-bit PC) architecture.  Where the CPUs do not implement SMAP or
it is disabled, a local user could exploit this to leak sensitive
information from the kernel.  Other architectures may also be
affected.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0461&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;slipper&amp;quot; reported a flaw in the kernel&#39;s support for ULPs (Upper
Layer Protocols) on top of TCP that can lead to a double-free when
using kernel TLS sockets.  A local user can exploit this for
denial of service (crash or memory corruption) or possibly for
privilege escalation.

Kernel TLS is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1073&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the HID (Human
Interface Device) subsystem.  An attacker able to insert and
remove USB devices might be able to use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1074&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the SCTP
protocol implementation which can lead to a memory leak.  A local
user could exploit this to cause a denial of service (resource
exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1078&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the RDS protocol
implementation.  A local user could exploit this to cause a denial
of service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1079&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a race condition in the hid-asus HID
driver which could lead to a use-after-free.  An attacker able to
insert and remove USB devices can use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1118&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Duoming Zhou reported a race condition in the ene_ir remote
control driver that can lead to a use-after-free if the driver
is unbound.  It is not clear what the security impact of this is.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1281, CVE-2023-1829&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;valis&amp;quot; reported two flaws in the cls_tcindex network traffic
classifier which could lead to a use-after-free.  A local user can
exploit these for privilege escalation.  This update removes
cls_tcindex entirely.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1513&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xingyuan Mo reported an information leak in the KVM implementation
for the i386 (32-bit PC) architecture.  A local user could exploit
this to leak sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1670&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the xirc2ps_cs network
driver which can lead to a use-after-free.  An attacker able to
insert and remove PCMCIA devices can use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1855&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the xgene-hwmon hardware
monitoring driver that may lead to a use-after-free.  It is not
clear what the security impact of this is.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1859&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the 9pnet_xen transport
for the 9P filesystem on Xen, which can lead to a use-after-free.
On systems where this feature is used, a backend driver in another
domain can use this to cause a denial of service (crash or memory
corruption) or possibly to run arbitrary code in the vulnerable
domain.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1989&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the btsdio Bluetooth
adapter driver that can lead to a use-after-free.  An attacker
able to insert and remove SDIO devices can use this to cause a
denial of service (crash or memory corruption) or possibly to run
arbitrary code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1990&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the st-nci NFC adapter
driver that can lead to a use-after-free.  It is not clear what
the security impact of this is.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1998&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;José Oliveira and Rodrigo Branco reported a regression in Spectre
v2 mitigation for user-space on x86 CPUs supporting IBRS but not
eIBRS.  This might be exploitable by a local or remote attacker to
leak sensitive information from a user-space application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2162&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mike Christie reported a race condition in the iSCSI TCP transport
that can lead to a use-after-free.  On systems where this feature
is used, a local user might be able to use this to cause a denial
of service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2194&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wei Chen reported a potential heap buffer overflow in the
i2c-xgene-slimpro I²C adapter driver.  A local user with
permission to access such a device can use this to cause a denial
of service (crash or memory corruption) and probably for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23454&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng reported that the Class Based Queueing (CBQ) network
scheduler was prone to denial of service due to interpreting
classification results before checking the classification return
code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23455&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng reported that the ATM Virtual Circuits (ATM) network
scheduler was prone to a denial of service due to interpreting
classification results before checking the classification return
code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23559&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Szymon Heidrich reported incorrect bounds checks in the rndis_wlan
Wi-Fi driver which may lead to a heap buffer overflow or overread.
An attacker able to insert and remove USB devices can use this to
cause a denial of service (crash or memory corruption) or
information leak, or possibly to run arbitrary code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-26545&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lianhui Tang reported a flaw in the MPLS protocol implementation
that could lead to a double-free.  A local user might be able to
exploit this to cause a denial of service (crash or memory
corruption) or possibl for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28328&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wei Chen reported a flaw in the az6927 DVB driver that can lead to
a null pointer dereference.  A local user permitted to access an
I²C adapter device that this driver creates can use this to cause
a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-30456&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reima ISHII reported a flaw in the KVM implementation for Intel
CPUs affecting nested virtualisation.  When KVM was used as the L0
hypervisor, and EPT and/or unrestricted guest mode was disabled,
it did not prevent an L2 guest from being configured with an
architecturally invalid protection/paging mode.  A malicious guest
could exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-30772&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the da9150 charger driver
which could lead to a use-after-free.  It is not clear what the
security impact of this is.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update additionally fixes Debian bug #825141, and
includes many more bug fixes from stable updates 4.19.270-4.19.282
inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-832-2 syslog-ng regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-832-2-syslog-ng/</link>
      <pubDate>Thu, 04 May 2023 21:11:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-832-2-syslog-ng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-832-2-syslog-ng/">
      
&lt;p&gt;Package : syslog-ng&lt;/p&gt;


&lt;p&gt;Version : 3.5.6-2&amp;#43;deb8u2 (jessie)&lt;/p&gt;


      &lt;p&gt;It has been reported that the previous security update, issued as ELA-832-1,
caused a regression leading to the syslog-ng daemon restarting.&lt;/p&gt;
&lt;p&gt;This update fixes this regression.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-846-2 openimageio regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-846-2-openimageio/</link>
      <pubDate>Thu, 04 May 2023 02:35:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-846-2-openimageio/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-846-2-openimageio/">
      
&lt;p&gt;Package : openimageio&lt;/p&gt;


&lt;p&gt;Version : 1.4.14~dfsg0-1&amp;#43;deb8u2 (jessie)&lt;/p&gt;


      &lt;p&gt;The previous security update of openimageio, issued as ELA-846-1, could not be
built on the armel computer platform for Debian 8 &amp;ldquo;Jessie&amp;rdquo;. This update
disables the creation of openimageio&amp;rsquo;s pdf documentation at build time on
armel. All other platforms are not affected and an upgrade is not required.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-846-1 openimageio security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-846-1-openimageio/</link>
      <pubDate>Wed, 03 May 2023 11:53:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-846-1-openimageio/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-846-1-openimageio/">
      
&lt;p&gt;Package : openimageio&lt;/p&gt;


&lt;p&gt;Version : 1.4.14~dfsg0-1&amp;#43;deb8u1 (jessie), 1.6.17~dfsg0-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36354&#34;&gt;CVE-2022-36354&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41838&#34;&gt;CVE-2022-41838&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41999&#34;&gt;CVE-2022-41999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43592&#34;&gt;CVE-2022-43592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43593&#34;&gt;CVE-2022-43593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43594&#34;&gt;CVE-2022-43594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43595&#34;&gt;CVE-2022-43595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43596&#34;&gt;CVE-2022-43596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43597&#34;&gt;CVE-2022-43597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43598&#34;&gt;CVE-2022-43598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43599&#34;&gt;CVE-2022-43599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43600&#34;&gt;CVE-2022-43600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43601&#34;&gt;CVE-2022-43601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43602&#34;&gt;CVE-2022-43602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43603&#34;&gt;CVE-2022-43603&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in OpenImageIO, a
library for reading and writing images. Buffer overflows and out-of-bounds read
and write programming errors may lead to a denial of service (application
crash) or the execution of arbitrary code if a malformed image file is
processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-845-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-845-1-linux-5.10/</link>
      <pubDate>Wed, 03 May 2023 09:48:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-845-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-845-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.178-3~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2196&#34;&gt;CVE-2022-2196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3424&#34;&gt;CVE-2022-3424&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3707&#34;&gt;CVE-2022-3707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4129&#34;&gt;CVE-2022-4129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4379&#34;&gt;CVE-2022-4379&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0045&#34;&gt;CVE-2023-0045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0458&#34;&gt;CVE-2023-0458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0459&#34;&gt;CVE-2023-0459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0461&#34;&gt;CVE-2023-0461&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1073&#34;&gt;CVE-2023-1073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1074&#34;&gt;CVE-2023-1074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1076&#34;&gt;CVE-2023-1076&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1077&#34;&gt;CVE-2023-1077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1078&#34;&gt;CVE-2023-1078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1079&#34;&gt;CVE-2023-1079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1118&#34;&gt;CVE-2023-1118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1281&#34;&gt;CVE-2023-1281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1513&#34;&gt;CVE-2023-1513&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1611&#34;&gt;CVE-2023-1611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1670&#34;&gt;CVE-2023-1670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1829&#34;&gt;CVE-2023-1829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1855&#34;&gt;CVE-2023-1855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1859&#34;&gt;CVE-2023-1859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1872&#34;&gt;CVE-2023-1872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1989&#34;&gt;CVE-2023-1989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1990&#34;&gt;CVE-2023-1990&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1998&#34;&gt;CVE-2023-1998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2162&#34;&gt;CVE-2023-2162&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-2194&#34;&gt;CVE-2023-2194&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22998&#34;&gt;CVE-2023-22998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23004&#34;&gt;CVE-2023-23004&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23559&#34;&gt;CVE-2023-23559&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25012&#34;&gt;CVE-2023-25012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26545&#34;&gt;CVE-2023-26545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28328&#34;&gt;CVE-2023-28328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28466&#34;&gt;CVE-2023-28466&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-30456&#34;&gt;CVE-2023-30456&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, or information
leak.&lt;/p&gt;
&lt;p&gt;CVE-2022-2196&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A regression was discovered in the KVM implementation for Intel CPUs,
affecting Spectre v2 mitigation for nested virtualisation.  When
KVM was used as the L0 hypervisor, an L2 guest could exploit this
to leak sensitive information from its L1 hypervisor.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3424&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang and Zhuorao Yang reported a flaw in the SGI GRU driver
which could lead to a use-after-free.  On systems where this driver
is used, a local user can explit this for denial of service (crash
or memory corruption) or possibly for privilege escalation.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3707&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a flaw in the i915 graphics driver&#39;s
virtualisation (GVT-g) support that could lead to a double-free.
On systems where this feature is used, a guest can exploit this
for denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4129&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Haowei Yan reported a race condition in the L2TP protocol
implementation which could lead to a null pointer dereference.  A
local user could exploit this for denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4379&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xingyuan Mo reported a flaw in the NFSv4.2 inter server to
server copy implementation which could lead to a use-after-free.

This feature is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0045&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Rodrigo Branco and Rafael Correa De Ysasi reported that when a
user-space task told the kernel to enable Spectre v2 mitigation
for it, the mitigation was not enabled until the task was next
rescheduled.  This might be exploitable by a local or remote
attacker to leak sensitive information from such an application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0458&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jordy Zimmer and Alexandra Sandulescu found that getrlimit() and
related system calls were vulnerable to speculative execution
attacks such as Spectre v1.  A local user could explot this to
leak sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0459&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jordy Zimmer and Alexandra Sandulescu found a regression in
Spectre v1 mitigation in the user-copy functions for the amd64
(64-bit PC) architecture.  Where the CPUs do not implement SMAP or
it is disabled, a local user could exploit this to leak sensitive
information from the kernel.  Other architectures may also be
affected.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0461&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;slipper&amp;quot; reported a flaw in the kernel&#39;s support for ULPs (Upper
Layer Protocols) on top of TCP that can lead to a double-free when
using kernel TLS sockets.  A local user can exploit this for
denial of service (crash or memory corruption) or possibly for
privilege escalation.

Kernel TLS is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1073&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the HID (Human
Interface Device) subsystem.  An attacker able to insert and
remove USB devices might be able to use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1074&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the SCTP
protocol implementation which can lead to a memory leak.  A local
user could exploit this to cause a denial of service (resource
exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1076&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the TUN/TAP
network driver, which results in all TUN/TAP sockets being marked
as belonging to user ID 0 (root).  This may allow local users to
evade local firewall rules based on user ID.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1077&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the task
scheduler.  A local user might be able to exploit this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1078&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a type confusion flaw in the RDS protocol
implementation.  A local user could exploit this to cause a denial
of service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1079&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a race condition in the hid-asus HID
driver which could lead to a use-after-free.  An attacker able to
insert and remove USB devices can use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1118&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Duoming Zhou reported a race condition in the ene_ir remote
control driver that can lead to a use-after-free if the driver
is unbound.  It is not clear what the security impact of this is.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1281, CVE-2023-1829&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;valis&amp;quot; reported two flaws in the cls_tcindex network traffic
classifier which could lead to a use-after-free.  A local user can
exploit these for privilege escalation.  This update removes
cls_tcindex entirely.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1513&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xingyuan Mo reported an information leak in the KVM implementation
for the i386 (32-bit PC) architecture.  A local user could exploit
this to leak sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1611&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;butt3rflyh4ck&amp;quot; reported a race condition in the btrfs filesystem
driver which can lead to a use-after-free.  A local user could
exploit this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1670&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the xirc2ps_cs network
driver which can lead to a use-after-free.  An attacker able to
insert and remove PCMCIA devices can use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1855&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the xgene-hwmon hardware
monitoring driver that may lead to a use-after-free.  It is not
clear what the security impact of this is.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1859&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the 9pnet_xen transport
for the 9P filesystem on Xen, which can lead to a use-after-free.
On systems where this feature is used, a backend driver in another
domain can use this to cause a denial of service (crash or memory
corruption) or possibly to run arbitrary code in the vulnerable
domain.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1872&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Bing-Jhong Billy Jheng reported a race condition in the io_uring
subsystem that can lead to a use-after-free.  A local user could
exploit this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1989&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the btsdio Bluetooth
adapter driver that can lead to a use-after-free.  An attacker
able to insert and remove SDIO devices can use this to cause a
denial of service (crash or memory corruption) or possibly to run
arbitrary code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1990&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Wang reported a race condition in the st-nci NFC adapter
driver that can lead to a use-after-free.  It is not clear what
the security impact of this is.

This driver is not enabled in Debian&#39;s official kernel
configurations.    
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1998&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;José Oliveira and Rodrigo Branco reported a regression in Spectre
v2 mitigation for user-space on x86 CPUs supporting IBRS but not
eIBRS.  This might be exploitable by a local or remote attacker to
leak sensitive information from a user-space application.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2162&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mike Christie reported a race condition in the iSCSI TCP transport
that can lead to a use-after-free.  On systems where this feature
is used, a local user might be able to use this to cause a denial
of service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-2194&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wei Chen reported a potential heap buffer overflow in the
i2c-xgene-slimpro I²C adapter driver.  A local user with
permission to access such a device can use this to cause a denial
of service (crash or memory corruption) and probably for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-22998&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Miaoqian Lin reported an incorrect error check in the virtio-gpu
GPU driver.  A local user with access to such a device might be
able to use this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23004&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Miaoqian Lin reported an incorrect error check in the mali-dp GPU
driver.  A local user with access to such a device might be able
to use this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23559&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Szymon Heidrich reported incorrect bounds checks in the rndis_wlan
Wi-Fi driver which may lead to a heap buffer overflow or overread.
An attacker able to insert and remove USB devices can use this to
cause a denial of service (crash or memory corruption) or
information leak, or possibly to run arbitrary code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25012&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Pietro Borrello reported a race condition in the hid-bigbenff HID
driver which could lead to a use-after-free.  An attacker able to
insert and remove USB devices can use this to cause a denial of
service (crash or memory corruption) or possibly to run arbitrary
code in the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-26545&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lianhui Tang reported a flaw in the MPLS protocol implementation
that could lead to a double-free.  A local user might be able to
exploit this to cause a denial of service (crash or memory
corruption) or possibl for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28328&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wei Chen reported a flaw in the az6927 DVB driver that can lead to
a null pointer dereference.  A local user permitted to access an
I²C adapter device that this driver creates can use this to cause
a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28466&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hangyu Hua reported a race condition in the kernel TLS socket
implementation which can lead to a use-after-free or null
pointer dereference.  A local user can exploit this for
denial of service (crash or memory corruption) or possibly for
privilege escalation.

This feature is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-30456&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Reima ISHII reported a flaw in the KVM implementation for Intel
CPUs affecting nested virtualisation.  When KVM was used as the L0
hypervisor, and EPT and/or unrestricted guest mode was disabled,
it did not prevent an L2 guest from being configured with an
architecturally invalid protection/paging mode.  A malicious guest
could exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update additionally fixes Debian bugs
#989705, #993612, #1022126, and #1031753; and includes many more bug
fixes from stable updates 5.10.163-5.10.178 inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-844-1 avahi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-844-1-avahi/</link>
      <pubDate>Tue, 02 May 2023 11:29:35 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-844-1-avahi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-844-1-avahi/">
      
&lt;p&gt;Package : avahi&lt;/p&gt;


&lt;p&gt;Version : 0.6.31-5&amp;#43;deb8u2 (jessie), 0.6.32-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1981&#34;&gt;CVE-2023-1981&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a local Denial of Service (DoS) vulnerability
in &lt;a href=&#34;https://www.avahi.org/&#34;&gt;Avahi&lt;/a&gt;, a system that facilitates service discovery
on a local network.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;avahi-daemon&lt;/code&gt; process could have been crashed over the DBus message bus.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-843-1 libdatetime-timezone-perl new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-843-1-libdatetime-timezone-perl/</link>
      <pubDate>Tue, 02 May 2023 15:23:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-843-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-843-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2023c (jessie), 1:2.09-1&amp;#43;2023c (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2023c for the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-842-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-842-1-tzdata/</link>
      <pubDate>Tue, 02 May 2023 15:19:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-842-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-842-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u10 (jessie), 2021a-0&amp;#43;deb9u10 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2023c. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Revert Lebanon DST changes.&lt;/li&gt;
&lt;li&gt;Updated leap second list.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-841-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-841-1-distro-info-data/</link>
      <pubDate>Sun, 30 Apr 2023 21:57:18 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-841-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-841-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.36~bpo8&amp;#43;3 (jessie), 0.41&amp;#43;deb10u2~bpo9&amp;#43;3 (stretch)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian ELTS
users.&lt;/p&gt;
&lt;p&gt;It includes the expected release date for Debian 12, adds Debian 14, adds
Ubuntu 23.10, and some minor updates to EoL dates for Ubuntu releases.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-840-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-840-1-apache2/</link>
      <pubDate>Sun, 30 Apr 2023 23:47:57 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-840-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-840-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u25 (jessie), 2.4.25-3&amp;#43;deb9u15 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2006-20001&#34;&gt;CVE-2006-20001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36760&#34;&gt;CVE-2022-36760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37436&#34;&gt;CVE-2022-37436&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25690&#34;&gt;CVE-2023-25690&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in apache2, a webserver that may be used as front-end proxy for other applications. These vulnerabilities may lead to HTTP request smuggling, and thus to front-end security controls being bypassed.&lt;/p&gt;
&lt;p&gt;Unfortunately, fixing these security vulnerabilities may require changes to configuration files. Some out-of-specification RewriteRule directives that were previously silently accepted, are now rejected with error AH10409. For instance, some RewriteRules that included a back-reference and the flags &amp;ldquo;[L,NC]&amp;rdquo; will need to be written with extra escaping flags such as &amp;ldquo;[B= ?,BNP,QSA]&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;CVE-2006-20001&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36760&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Inconsistent Interpretation of HTTP Requests (&#39;HTTP Request Smuggling&#39;) vulnerability in mod_proxy_ajp of Apache HTTP Server allowed an attacker to smuggle requests to the AJP server it forwards requests to.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-37436&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25690&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Some mod_proxy configurations allow an HTTP request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-839-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-839-1-wireshark/</link>
      <pubDate>Sat, 29 Apr 2023 23:41:05 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-839-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-839-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 2.6.20-0&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1161&#34;&gt;CVE-2023-1161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1992&#34;&gt;CVE-2023-1992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1993&#34;&gt;CVE-2023-1993&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1994&#34;&gt;CVE-2023-1994&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were fixed in the network traffic analyzer Wireshark.&lt;/p&gt;
&lt;p&gt;CVE-2023-1161&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ISO 15765 dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1992&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;RPCoRDMA dissector crash
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1993&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LISP dissector large loop vulnerability
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-1994&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GQUIC dissector crash
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-838-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-838-1-redis/</link>
      <pubDate>Fri, 21 Apr 2023 13:18:10 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-838-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-838-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u11 (jessie), 2:2.8.17-1&amp;#43;deb8u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28856&#34;&gt;CVE-2023-28856&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential remote denial of service
vulnerability in Redis, a popular NoSQL key-value database.&lt;/p&gt;
&lt;p&gt;Authenticated users could have used the &lt;code&gt;HINCRBYFLOAT&lt;/code&gt; command to create an
invalid hash field that would have crashed the Redis server on access.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-837-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-837-1-libxml2/</link>
      <pubDate>Thu, 20 Apr 2023 19:40:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-837-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-837-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u15 (jessie), 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5130&#34;&gt;CVE-2017-5130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5969&#34;&gt;CVE-2017-5969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28484&#34;&gt;CVE-2023-28484&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-29469&#34;&gt;CVE-2023-29469&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in libxml2, the GNOME XML library, which possibly
allows an remote attacker to trigger a potential heap memory corruption or
trigger a denial of service or other unspecified impact.&lt;/p&gt;
&lt;p&gt;The Jessie update 2.9.1+dfsg1-5+deb8u15 fixes all mentioned CVEs.
The Stretch update 2.9.4+dfsg1-2.2+deb9u10 fixes CVE-2023-28484 and CVE-2023-29469,
as the other have been fixed by an previous upload &amp;ndash; see DLA-2972-1 for details.&lt;/p&gt;
&lt;p&gt;CVE-2017-5130&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in
Google Chrome prior to 62.0.3202.62 and other products, allowed a remote
attacker to potentially exploit heap corruption via a crafted XML file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-5969&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libxml2 2.9.4, when used in recover mode, allows one to cause a denial
of service (NULL pointer dereference) via a crafted XML document.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28484&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL dereference in xmlSchemaFixupComplexType.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-29469&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hashing of empty dict strings isn&#39;t deterministic.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-836-1 protobuf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-836-1-protobuf/</link>
      <pubDate>Wed, 19 Apr 2023 08:58:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-836-1-protobuf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-836-1-protobuf/">
      
&lt;p&gt;Package : protobuf&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-1&amp;#43;deb8u1 (jessie), 3.0.0-9&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22569&#34;&gt;CVE-2021-22569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22570&#34;&gt;CVE-2021-22570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1941&#34;&gt;CVE-2022-1941&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes a NULL pointer dereference and two denial of service
conditions in protobuf.&lt;/p&gt;
&lt;p&gt;CVE-2021-22569&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue in protobuf-java allowed the interleaving of
com.google.protobuf.UnknownFieldSet fields in such a way that would be
processed out of order. A small malicious payload can occupy the parser for
several minutes by creating large numbers of short-lived objects that cause
frequent, repeated pauses.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-22570&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Nullptr dereference when a null char is present in a proto symbol. The
symbol is parsed incorrectly, leading to an unchecked call into the proto
file&#39;s name during generation of the resulting error message. Since the
symbol is incorrectly parsed, the file is nullptr.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1941&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A parsing vulnerability for the MessageSet type in the ProtocolBuffers can
lead to out of memory failures. A specially crafted message with multiple
key-value per elements creates parsing issues, and can lead to a Denial of
Service against services receiving unsanitized input.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-835-1 pjproject security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-835-1-pjproject/</link>
      <pubDate>Tue, 18 Apr 2023 22:50:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-835-1-pjproject/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-835-1-pjproject/">
      
&lt;p&gt;Package : pjproject&lt;/p&gt;


&lt;p&gt;Version : 2.5.5~dfsg-6&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27585&#34;&gt;CVE-2023-27585&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PJSIP is a free and open source multimedia communication library written in C.
A buffer overflow vulnerability affects applications that use PJSIP DNS
resolver. It doesn&amp;rsquo;t affect PJSIP users who do not utilise PJSIP DNS resolver.
This vulnerability is related to CVE-2022-24793. The difference is that this
issue is in parsing the query record &lt;code&gt;parse_query()&lt;/code&gt;, while the issue in
CVE-2022-24793 is in &lt;code&gt;parse_rr()&lt;/code&gt;. A workaround is to disable DNS resolution in
PJSIP config (by setting &lt;code&gt;nameserver_count&lt;/code&gt; to zero) or use an external
resolver implementation instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-833-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-833-1-ghostscript/</link>
      <pubDate>Tue, 18 Apr 2023 01:14:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-833-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-833-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u11 (jessie), 9.26a~dfsg-0&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28879&#34;&gt;CVE-2023-28879&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential buffer-overflow vulnerability in
ghostscript, a popular interpreter for the PostScript language used, for
example, to generate PDF files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-834-1 keepalived security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-834-1-keepalived/</link>
      <pubDate>Tue, 18 Apr 2023 01:12:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-834-1-keepalived/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-834-1-keepalived/">
      
&lt;p&gt;Package : keepalived&lt;/p&gt;


&lt;p&gt;Version : 1:1.3.2-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19115&#34;&gt;CVE-2018-19115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44225&#34;&gt;CVE-2021-44225&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were found in keepalived, a failover and
monitoring daemon for LVS clusters.&lt;/p&gt;
&lt;p&gt;CVE-2018-19115&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;keepalived has a heap-based buffer overflow when parsing HTTP
status codes resulting in DoS or possibly unspecified other impact, because
extract_status_code in lib/html.c has no validation of the status code and
instead writes an unlimited amount of data to the heap.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44225&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in keepalived where an improper authentication
vulnerability allows an unprivileged user to change properties that could
lead to an access-control bypass.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-832-1 syslog-ng security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-832-1-syslog-ng/</link>
      <pubDate>Sun, 16 Apr 2023 14:41:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-832-1-syslog-ng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-832-1-syslog-ng/">
      
&lt;p&gt;Package : syslog-ng&lt;/p&gt;


&lt;p&gt;Version : 3.5.6-2&amp;#43;deb8u1 (jessie), 3.8.1-10&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38725&#34;&gt;CVE-2022-38725&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that an integer overflow in the RFC3164 parser of
syslog-ng, a system logging daemon, may result in denial of service
via malformed syslog messages.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-831-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-831-1-curl/</link>
      <pubDate>Mon, 10 Apr 2023 17:45:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-831-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-831-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u26 (jessie), 7.52.1-5&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27533&#34;&gt;CVE-2023-27533&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27535&#34;&gt;CVE-2023-27535&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27536&#34;&gt;CVE-2023-27536&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27538&#34;&gt;CVE-2023-27538&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in cURL, an easy-to-use client-side
URL transfer library.&lt;/p&gt;
&lt;p&gt;CVE-2023-27533&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability in input validation exists in curl during
communication using the TELNET protocol. It may allow an attacker to pass on
maliciously crafted user name and &amp;quot;telnet options&amp;quot; during server
negotiation. The lack of proper input scrubbing allows an attacker to send
content or perform option negotiation without the application&#39;s intent.
This vulnerability could be exploited if an application allows user input,
thereby enabling attackers to execute arbitrary code on the system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-27535&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An authentication bypass vulnerability exists in libcurl in the FTP
connection reuse feature that can result in wrong credentials being used
during subsequent transfers. Previously created connections are kept in a
connection pool for reuse if they match the current setup. However, certain
FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER,
CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the
configuration match checks, causing them to match too easily. This could
lead to libcurl using the wrong credentials when performing a transfer,
potentially allowing unauthorized access to sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-27536&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An authentication bypass vulnerability exists in libcurl in the
connection reuse feature which can reuse previously established connections
with incorrect user permissions due to a failure to check for changes in
the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects
krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in
unauthorized access to sensitive information. The safest option is to not
reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-27538&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An authentication bypass vulnerability exists in libcurl where it
reuses a previously established SSH connection despite the fact that an SSH
option was modified, which should have prevented reuse. libcurl maintains a
pool of previously used connections to reuse them for subsequent transfers
if the configurations match. However, two SSH settings were omitted from
the configuration check, allowing them to match easily, potentially leading
to the reuse of an inappropriate connection.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-830-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-830-1-tomcat8/</link>
      <pubDate>Mon, 10 Apr 2023 17:35:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-830-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-830-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u25 (jessie), 8.5.54-0&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28708&#34;&gt;CVE-2023-28708&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw has been found in the Tomcat servlet and JSP engine. When using the
RemoteIpFilter with requests received from a reverse proxy via HTTP that
include the X-Forwarded-Proto header set to https, session cookies created by
Apache Tomcat did not include the secure attribute. This could result in the
user agent transmitting the session cookie over an insecure channel.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-828-1 dnsmasq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-828-1-dnsmasq/</link>
      <pubDate>Mon, 10 Apr 2023 13:01:40 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-828-1-dnsmasq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-828-1-dnsmasq/">
      
&lt;p&gt;Package : dnsmasq&lt;/p&gt;


&lt;p&gt;Version : 2.72-3&amp;#43;deb8u7 (jessie), 2.76-5&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15107&#34;&gt;CVE-2017-15107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14834&#34;&gt;CVE-2019-14834&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0934&#34;&gt;CVE-2022-0934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28450&#34;&gt;CVE-2023-28450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were found on dnsmasq, a lightweight, easy to configure
DNS forwarder, designed to provide DNS (and optionally DHCP and TFTP)
services to a small-scale network.&lt;/p&gt;
&lt;p&gt;CVE-2017-15107&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in the implementation of
DNSSEC in Dnsmasq. Wildcard synthesized NSEC records could be
improperly interpreted to prove the non-existence of hostnames that
actually exist.
This particular CVE was only fixed for 2.76-5+deb9u4. DNSSEC validation
for jessie (until 2.73) does a bottom/top validation instead of a top/bottom
validation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14834&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in dnsmasq before version
2.81, where the memory leak allows remote attackers to cause a denial
of service (memory consumption) via vectors involving DHCP response
creation
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0934&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A single-byte, non-arbitrary write/use-after-free flaw
was found in dnsmasq. This flaw allows an attacker who sends a crafted
packet processed by dnsmasq, potentially causing a denial of
service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-28450&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The default maximum EDNS.0 UDP packet size was set
to 4096 but should be 1232 because of DNS Flag Day 2020.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-827-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-827-1-tomcat7/</link>
      <pubDate>Mon, 10 Apr 2023 14:50:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-827-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-827-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u3 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-28708&#34;&gt;CVE-2023-28708&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw has been found in the Tomcat servlet and JSP engine. When using the
RemoteIpFilter with requests received from a reverse proxy via HTTP that
include the X-Forwarded-Proto header set to https, session cookies created by
Apache Tomcat did not include the secure attribute. This could result in the
user agent transmitting the session cookie over an insecure channel.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-826-1 firmware-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-826-1-firmware-nonfree/</link>
      <pubDate>Sun, 02 Apr 2023 11:03:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-826-1-firmware-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-826-1-firmware-nonfree/">
      
&lt;p&gt;Package : firmware-nonfree&lt;/p&gt;


&lt;p&gt;Version : 20190114&amp;#43;really20220913-0&amp;#43;deb8u1 (jessie), 20190114&amp;#43;really20220913-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12362&#34;&gt;CVE-2020-12362&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12363&#34;&gt;CVE-2020-12363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12364&#34;&gt;CVE-2020-12364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24586&#34;&gt;CVE-2020-24586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24587&#34;&gt;CVE-2020-24587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24588&#34;&gt;CVE-2020-24588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23168&#34;&gt;CVE-2021-23168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23223&#34;&gt;CVE-2021-23223&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37409&#34;&gt;CVE-2021-37409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44545&#34;&gt;CVE-2021-44545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21181&#34;&gt;CVE-2022-21181&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The firmware-nonfree package has been updated to include addtional firmware
that may be requested by some drivers in newer Linux kernels.&lt;/p&gt;
&lt;p&gt;Some of the updated firmware files adresses security vulnerabilities, which may
allow Escalation of Privileges, Denial of Services and Information Disclosures.&lt;/p&gt;
&lt;p&gt;For best support, we recommend to utilize &lt;a href=&#34;https://www.freexian.com/lts/extended/docs/kernel-backport&#34;&gt;the backported (Extended) LTS kernels.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;CVE-2020-24586 (INTEL-SA-00473)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn&#39;t require
that received fragments be cleared from memory after (re)connecting
to a network. Under the right circumstances, when another device
sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can
be abused to inject arbitrary network packets and/or exfiltrate user
data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24587  (INTEL-SA-00473)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn&#39;t require
that all fragments of a frame are encrypted under the same key. An
adversary can abuse this to decrypt selected fragments when another
device sends fragmented frames and the WEP, CCMP, or GCMP encryption
key is periodically renewed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24588  (INTEL-SA-00473)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn&#39;t require
that the A-MSDU flag in the plaintext QoS header field is
authenticated. Against devices that support receiving non-SSP A-MSDU
frames (which is mandatory as part of 802.11n), an adversary can
abuse this to inject arbitrary network packets.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23168  (INTEL-SA-00621)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out of bounds read for some Intel(R) PROSet/Wireless WiFi and
Killer(TM) WiFi products may allow an unauthenticated user to
potentially enable denial of service via adjacent access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23223 (INTEL-SA-00621)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper initialization for some Intel(R) PROSet/Wireless WiFi and
Killer(TM) WiFi products may allow a privileged user to potentially
enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37409 (INTEL-SA-00621)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper access control for some Intel(R) PROSet/Wireless WiFi and
Killer(TM) WiFi products may allow a privileged user to potentially
enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44545 (INTEL-SA-00621)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation for some Intel(R) PROSet/Wireless WiFi and
Killer(TM) WiFi products may allow an unauthenticated user to
potentially enable denial of service via adjacent access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-21181 (INTEL-SA-00621)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation for some Intel(R) PROSet/Wireless WiFi and
Killer(TM) WiFi products may allow a privileged user to potentially
enable escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The following advisories are also fixed by this upload, but needs an
updated Linux kernel to load the updated firmware:&lt;/p&gt;
&lt;p&gt;CVE-2020-12362 (INTEL-SA-00438)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in the firmware for some Intel(R) Graphics Drivers
for Windows * before version 26.20.100.7212 and before Linux kernel
version 5.5 may allow a privileged user to potentially enable an
escalation of privilege via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12363 (INTEL-SA-00438)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper input validation in some Intel(R) Graphics Drivers for
Windows* before version 26.20.100.7212 and before Linux kernel
version 5.5 may allow a privileged user to potentially enable a
denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12364 (INTEL-SA-00438)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Null pointer reference in some Intel(R) Graphics Drivers for
Windows* before version 26.20.100.7212 and before version Linux
kernel version 5.5 may allow a privileged user to potentially enable
a denial of service via local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-825-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-825-1-intel-microcode/</link>
      <pubDate>Sat, 01 Apr 2023 12:13:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-825-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-825-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20230214.1~deb8u1 (jessie), 3.20230214.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21216&#34;&gt;CVE-2022-21216&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21233&#34;&gt;CVE-2022-21233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33196&#34;&gt;CVE-2022-33196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33972&#34;&gt;CVE-2022-33972&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38090&#34;&gt;CVE-2022-38090&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple potential security vulnerabilities in some Intel® Processors
have been found which may allow information disclosure or may allow
escalation of privilege. Intel is releasing microcode updates to mitigate
this potential vulnerabilities.&lt;/p&gt;
&lt;p&gt;Please pay attention that the fix for CVE-2022-33196 might require a
firmware update.&lt;/p&gt;
&lt;p&gt;CVE-2022-21216 (INTEL-SA-00700)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Insufficient granularity of access control in out-of-band
management in some Intel(R) Atom and Intel Xeon Scalable Processors
may allow a privileged user to potentially enable escalation of
privilege via adjacent network access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-21233 (INTEL-SA-00657)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper isolation of shared resources in some Intel(R) Processors
may allow a privileged user to potentially enable information
disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-33196 (INTEL-SA-00738)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect default permissions in some memory controller
configurations for some Intel(R) Xeon(R) Processors when using
Intel(R) Software Guard Extensions which may allow a privileged user
to potentially enable escalation of privilege via local access.

This fix may require a firmware update to be effective on some
processors.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-33972 (INTEL-SA-00730)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect calculation in microcode keying mechanism for some 3rd
Generation Intel(R) Xeon(R) Scalable Processors may allow a
privileged user to potentially enable information disclosure via
local acces
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38090 (INTEL-SA-00767)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper isolation of shared resources in some Intel(R) Processors
when using Intel(R) Software Guard Extensions may allow a privileged
user to potentially enable information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-824-1 libmicrohttpd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-824-1-libmicrohttpd/</link>
      <pubDate>Thu, 30 Mar 2023 23:21:47 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-824-1-libmicrohttpd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-824-1-libmicrohttpd/">
      
&lt;p&gt;Package : libmicrohttpd&lt;/p&gt;


&lt;p&gt;Version : 0.9.37&amp;#43;dfsg-1&amp;#43;deb8u1 (jessie), 0.9.51-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-27371&#34;&gt;CVE-2023-27371&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in linmicrohttpd, a library embedding HTTP server
functionality. Parsing crafted POST requests result in an out of bounds
read, which might cause a DoS (Denial of Service).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-823-1 joblib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-823-1-joblib/</link>
      <pubDate>Thu, 30 Mar 2023 19:59:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-823-1-joblib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-823-1-joblib/">
      
&lt;p&gt;Package : joblib&lt;/p&gt;


&lt;p&gt;Version : 0.8.3-1&amp;#43;deb8u1 (jessie), 0.10.3&amp;#43;git55-g660fe5d-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21797&#34;&gt;CVE-2022-21797&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that joblib did not properly sanitize arguments to pre_dispatch, allowing arbitrary code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-822-1 amanda security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-822-1-amanda/</link>
      <pubDate>Thu, 30 Mar 2023 15:38:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-822-1-amanda/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-822-1-amanda/">
      
&lt;p&gt;Package : amanda&lt;/p&gt;


&lt;p&gt;Version : 1:3.3.9-5&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37704&#34;&gt;CVE-2022-37704&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential privilege escalation vulnerability
in the &amp;ldquo;amanda&amp;rdquo; backup utility. The SUID binary located at /lib/amanda/rundump
executed /usr/sbin/dump as root with arguments controlled by the attacker,
which may have led to an escalation of privileges, denial of service (DoS) or
information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-821-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-821-1-xorg-server/</link>
      <pubDate>Wed, 29 Mar 2023 15:32:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-821-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-821-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u11 (jessie), 2:1.19.2-1&amp;#43;deb9u14 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-1393&#34;&gt;CVE-2023-1393&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered that a use-after-free flaw in the Composite
extension of the X.org X server may result in privilege escalation if
the X server is running under the root user.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-820-1 unbound1.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-820-1-unbound1.9/</link>
      <pubDate>Wed, 29 Mar 2023 00:29:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-820-1-unbound1.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-820-1-unbound1.9/">
      
&lt;p&gt;Package : unbound1.9&lt;/p&gt;


&lt;p&gt;Version : 1.9.0-2&amp;#43;deb10u2~deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3204&#34;&gt;CVE-2022-3204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30698&#34;&gt;CVE-2022-30698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30699&#34;&gt;CVE-2022-30699&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in unbound, a validating,
recursive, caching DNS resolver.&lt;/p&gt;
&lt;p&gt;CVE-2022-3204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability named &#39;Non-Responsive Delegation Attack&#39; (NRDelegation
Attack) has been discovered in various DNS resolving software. The
NRDelegation Attack works by having a malicious delegation with a
considerable number of non responsive nameservers. The attack starts by
querying a resolver for a record that relies on those unresponsive
nameservers. The attack can cause a resolver to spend a lot of
time/resources resolving records under a malicious delegation point where a
considerable number of unresponsive NS records reside. It can trigger high
CPU usage in some resolver implementations that continually look in the
cache for resolved NS records in that delegation. This can lead to degraded
performance and eventually denial of service in orchestrated attacks.
Unbound does not suffer from high CPU usage, but resources are still needed
for resolving the malicious delegation. Unbound will keep trying to resolve
the record until hard limits are reached. Based on the nature of the attack
and the replies, different limits could be reached. From now on Unbound
introduces fixes for better performance when under load, by cutting
opportunistic queries for nameserver discovery and DNSKEY prefetching and
limiting the number of times a delegation point can issue a cache lookup
for missing records.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30698 and CVE-2022-30699&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NLnet Labs Unbound is vulnerable to a novel type of the &amp;quot;ghost domain
names&amp;quot; attack. The vulnerability works by targeting an Unbound instance.
Unbound is queried for a rogue domain name when the cached delegation
information is about to expire. The rogue nameserver delays the response so
that the cached delegation information is expired. Upon receiving the
delayed answer containing the delegation information, Unbound overwrites
the now expired entries. This action can be repeated when the delegation
information is about to expire making the rogue delegation information
ever-updating. From now on Unbound stores the start time for a query and
uses that to decide if the cached delegation information can be
overwritten.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-819-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-819-1-imagemagick/</link>
      <pubDate>Fri, 24 Mar 2023 13:39:40 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-819-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-819-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u25 (jessie), 8:6.9.7.4&amp;#43;dfsg-11&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18028&#34;&gt;CVE-2017-18028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27767&#34;&gt;CVE-2020-27767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3574&#34;&gt;CVE-2021-3574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20224&#34;&gt;CVE-2021-20224&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44267&#34;&gt;CVE-2022-44267&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerability were found in ImageMagick, an image processing
software, that could result in deny of service, or memory leaks.&lt;/p&gt;
&lt;p&gt;CVE-2017-18028&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory exhaustion vulnerability was found in the function
ReadTIFFImage in coders/tiff.c, which allow remote attackers to
cause a denial of service via a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27767&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in ImageMagick in MagickCore/quantum.h.
An attacker who submits a crafted file that is processed by ImageMagick
could trigger undefined behavior in the form of values outside the range
of types `float` and `unsigned char`. This would most likely lead to
an impact to application availability, but could potentially cause
other problems related to undefined behavior.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3574&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in ImageMagick, executing a crafted file with
the convert command, will leak memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20224&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow issue was discovered in ImageMagick&#39;s
ExportIndexQuantum() function in MagickCore/quantum-export.c.
Function calls to GetPixelIndex() could result in values
outside the range of representable for the &#39;unsigned char&#39;.
When ImageMagick processes a crafted pdf file,
this could lead to an undefined behaviour or a crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44267&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ImageMagick was vulnerable to Denial of Service.
When it parses a PNG image (e.g., for resize), the convert process
could be left waiting for stdin input.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-818-1 libdatetime-timezone-perl new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-818-1-libdatetime-timezone-perl/</link>
      <pubDate>Fri, 24 Mar 2023 13:30:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-818-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-818-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2023b (jessie), 1:2.09-1&amp;#43;2023b (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2023b for the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-817-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-817-1-tzdata/</link>
      <pubDate>Fri, 24 Mar 2023 13:26:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-817-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-817-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u9 (jessie), 2021a-0&amp;#43;deb9u9 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2023b. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Egypt uses DST again, starting on April.&lt;/li&gt;
&lt;li&gt;Palestine and Lebanon delay the start of DST this year.&lt;/li&gt;
&lt;li&gt;Morocco DST will happen a week earlier on April 23.&lt;/li&gt;
&lt;li&gt;Adjustments to Greenland&amp;rsquo;s timezones and DST rules.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-798-2 sox regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-798-2-sox/</link>
      <pubDate>Mon, 20 Mar 2023 11:19:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-798-2-sox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-798-2-sox/">
      
&lt;p&gt;Package : sox&lt;/p&gt;


&lt;p&gt;Version : 14.4.1-5&amp;#43;deb8u6 (jessie), 14.4.1-5&amp;#43;deb9u4 (stretch)&lt;/p&gt;


      &lt;p&gt;One of the security fixes released as ELA 798 introduced a regression in the
processing WAV files with variable bitrate encoding. Updated sox packages are
available to correct this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-816-1 pcre2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-816-1-pcre2/</link>
      <pubDate>Sat, 18 Mar 2023 17:04:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-816-1-pcre2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-816-1-pcre2/">
      
&lt;p&gt;Package : pcre2&lt;/p&gt;


&lt;p&gt;Version : 10.22-3&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1586&#34;&gt;CVE-2022-1586&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple out-of-bounds read vulnerabilities were found in pcre2, a Perl
Compatible Regular Expression library, which could result in information
disclosure or denial or service.&lt;/p&gt;
&lt;p&gt;CVE-2022-1586&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds read vulnerability was discovered in the PCRE2 library
in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c
file. This involves a unicode property matching issue in JIT-compiled
regular expressions.  The issue occurs because the character was not
fully read in case-less matching within JIT.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Additionally, this upload also fixes a subject buffer overread in JIT
when UTF is disabled and \X or \R has a greater than 1 fixed quantifier.
This issue was found by Yunho Kim.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-815-1 net-snmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-815-1-net-snmp/</link>
      <pubDate>Mon, 13 Mar 2023 03:54:45 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-815-1-net-snmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-815-1-net-snmp/">
      
&lt;p&gt;Package : net-snmp&lt;/p&gt;


&lt;p&gt;Version : 5.7.2.1&amp;#43;dfsg-1&amp;#43;deb8u6 (jessie), 5.7.3&amp;#43;dfsg-1.7&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44792&#34;&gt;CVE-2022-44792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44793&#34;&gt;CVE-2022-44793&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;net-snmp, Simple Network Management Protocol agents, were reported to have
a couple of vulnerabilities, resulting in a denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2022-44792&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP
has a NULL Pointer Exception bug that can be used by a remote attacker
(who has write access) to cause the instance to crash via a crafted UDP
packet, resulting in Denial of Service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44793&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP
has a NULL Pointer Exception bug that can be used by a remote attacker to
cause the instance to crash via a crafted UDP packet, resulting in
Denial of Service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-814-1 jupyter-core security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-814-1-jupyter-core/</link>
      <pubDate>Mon, 13 Mar 2023 03:32:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-814-1-jupyter-core/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-814-1-jupyter-core/">
      
&lt;p&gt;Package : jupyter-core&lt;/p&gt;


&lt;p&gt;Version : 4.2.1-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39286&#34;&gt;CVE-2022-39286&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that jupyter-core, the base framework for Jupyter projects
like Jupyter Notebooks, could execute arbitrary code when loading
configuration files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-813-1 apr-util security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-813-1-apr-util/</link>
      <pubDate>Mon, 13 Mar 2023 02:24:43 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-813-1-apr-util/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-813-1-apr-util/">
      
&lt;p&gt;Package : apr-util&lt;/p&gt;


&lt;p&gt;Version : 1.5.4-1&amp;#43;deb8u1 (jessie), 1.5.4-3&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12618&#34;&gt;CVE-2017-12618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25147&#34;&gt;CVE-2022-25147&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;apr-util, Apache Portable Runtime Utility Library, had multiple
vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2017-12618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;apr-util fails to validate the integrity of SDBM database files
used by apr_sdbm*() functions, resulting in a possible out of
bound read access. A local user with write access to the database
can make a program or process using these functions crash, and
cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-25147&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer Overflow or Wraparound vulnerability in apr_base64
functions of apr-util allows an attacker to write beyond bounds
of a buffer.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-812-1 mono security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-812-1-mono/</link>
      <pubDate>Sun, 05 Mar 2023 23:11:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-812-1-mono/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-812-1-mono/">
      
&lt;p&gt;Package : mono&lt;/p&gt;


&lt;p&gt;Version : 4.6.2.7&amp;#43;dfsg-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-26314&#34;&gt;CVE-2023-26314&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Triggering arbitrary code execution was possible due to .desktop files
registered as application/x-ms-dos-executable MIME handlers in the open
source .NET framework Mono.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-811-1 libde265 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-811-1-libde265/</link>
      <pubDate>Sun, 05 Mar 2023 09:24:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-811-1-libde265/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-811-1-libde265/">
      
&lt;p&gt;Package : libde265&lt;/p&gt;


&lt;p&gt;Version : 1.0.11-0&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47664&#34;&gt;CVE-2022-47664&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47665&#34;&gt;CVE-2022-47665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24751&#34;&gt;CVE-2023-24751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24752&#34;&gt;CVE-2023-24752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24754&#34;&gt;CVE-2023-24754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24755&#34;&gt;CVE-2023-24755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24756&#34;&gt;CVE-2023-24756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24757&#34;&gt;CVE-2023-24757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24758&#34;&gt;CVE-2023-24758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-25221&#34;&gt;CVE-2023-25221&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in libde265, an open source implementation of the
h.265 video codec, which may result in denial of service, have unspecified
other impact, possibly code execution due to a heap-based buffer overflow.&lt;/p&gt;
&lt;p&gt;CVE-2022-47664&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 1.0.9 is vulnerable to Buffer Overflow in
ff_hevc_put_hevc_qpel_pixels_8_sse
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47665&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 1.0.9 has a heap buffer overflow vulnerability in
de265_image::set_SliceAddrRS(int, int, int)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24751&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the mc_chroma function at motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS)
via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at
sse-motion.cc. This vulnerability allows attackers to cause a Denial
of Service (DoS) via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24754&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at
sse-motion.cc. This vulnerability allows attackers to cause a Denial
of Service (DoS) via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24755&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the put_weighted_pred_8_fallback function at
fallback-motion.cc. This vulnerability allows attackers to cause a
Denial of Service (DoS) via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24756&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the ff_hevc_put_unweighted_pred_8_sse function at
sse-motion.cc. This vulnerability allows attackers to cause a Denial
of Service (DoS) via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24757&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the put_unweighted_pred_16_fallback function at
fallback-motion.cc. This vulnerability allows attackers to cause a
Denial of Service (DoS) via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24758&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.10 was discovered to contain a NULL pointer
dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at
sse-motion.cc. This vulnerability allows attackers to cause a Denial
of Service (DoS) via a crafted input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-25221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow
vulnerability in the derive_spatial_luma_vector_prediction function
in motion.cc.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-810-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-810-1-linux-5.10/</link>
      <pubDate>Fri, 03 Mar 2023 09:05:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-810-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-810-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.162-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2873&#34;&gt;CVE-2022-2873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3545&#34;&gt;CVE-2022-3545&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3623&#34;&gt;CVE-2022-3623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4696&#34;&gt;CVE-2022-4696&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36280&#34;&gt;CVE-2022-36280&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41218&#34;&gt;CVE-2022-41218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45934&#34;&gt;CVE-2022-45934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47929&#34;&gt;CVE-2022-47929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0179&#34;&gt;CVE-2023-0179&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0240&#34;&gt;CVE-2023-0240&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0266&#34;&gt;CVE-2023-0266&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0394&#34;&gt;CVE-2023-0394&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23454&#34;&gt;CVE-2023-23454&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23455&#34;&gt;CVE-2023-23455&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23586&#34;&gt;CVE-2023-23586&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2022-2873&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheyu Ma discovered that an out-of-bounds memory access flaw in
the Intel iSMT SMBus 2.0 host controller driver may result in
denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3545&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Netronome Flow Processor (NFP) driver
contained a use-after-free flaw in area_cache_get(), which may
result in denial of service or the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3623&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition when looking up a CONT-PTE/PMD size hugetlb page
may result in denial of service or an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4696&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability was discovered in the io_uring
subsystem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36280&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds memory write vulnerability was discovered in the
vmwgfx driver, which may allow a local unprivileged user to cause
a denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hyunwoo Kim reported a use-after-free flaw in the Media DVB core
subsystem caused by refcount races, which may allow a local user
to cause a denial of service or escalate privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-45934&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow in l2cap_config_req() in the Bluetooth
subsystem was discovered, which may allow a physically proximate
attacker to cause a denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47929&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Frederick Lawler reported a NULL pointer dereference in the
traffic control subsystem allowing an unprivileged user to cause a
denial of service by setting up a specially crafted traffic
control configuration.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0179&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Davide Ornaghi discovered incorrect arithmetics when fetching VLAN
header bits in the netfilter subsystem, allowing a local user to
leak stack and heap addresses or potentially local privilege
escalation to root.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0240&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the io_uring subsystem that could lead
to a use-after-free.  A local user could exploit this to cause
a denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0266&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw in the sound subsystem due to missing
locking may result in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0394&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered a NULL pointer dereference flaw in
rawv6_push_pending_frames() in the network subsystem allowing a
local user to cause a denial of service (system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23454&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng reported that the Class Based Queueing (CBQ) network
scheduler was prone to denial of service due to interpreting
classification results before checking the classification return
code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23455&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng reported that the ATM Virtual Circuits (ATM) network
scheduler was prone to a denial of service due to interpreting
classification results before checking the classification return
code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23586&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the io_uring subsystem that could lead to
an information leak.  A local user could exploit this to obtain
sensitive information from the kernel or other users.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update also fixes Debian bugs #825141, #1008501, #1027430, and
#1027483, and includes many more bug fixes from stable updates
5.10.159-5.10.162 inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-809-1 freeradius security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-809-1-freeradius/</link>
      <pubDate>Fri, 24 Feb 2023 22:00:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-809-1-freeradius/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-809-1-freeradius/">
      
&lt;p&gt;Package : freeradius&lt;/p&gt;


&lt;p&gt;Version : 3.0.17&amp;#43;dfsg-1.1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11234&#34;&gt;CVE-2019-11234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11235&#34;&gt;CVE-2019-11235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13456&#34;&gt;CVE-2019-13456&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17185&#34;&gt;CVE-2019-17185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41859&#34;&gt;CVE-2022-41859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41860&#34;&gt;CVE-2022-41860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41861&#34;&gt;CVE-2022-41861&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several flaws were found in freeradius, a high-performance and highly
configurable RADIUS server.&lt;/p&gt;
&lt;p&gt;CVE-2022-41859&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In freeradius, the EAP-PWD function compute_password_element() leaks
information about the password which allows an attacker to substantially
reduce the size of an offline dictionary attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41860&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the
server will try to look that option up in the internal dictionaries. This
lookup will fail, but the SIM code will not check for that failure.
Instead, it will dereference a NULL pointer, and cause the server to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41861&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in freeradius. A malicious RADIUS client or home server
can send a malformed attribute which can cause the server to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11234&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FreeRADIUS does not prevent use of reflection for authentication spoofing,
aka a &amp;quot;Dragonblood&amp;quot; issue, a similar issue to CVE-2019-9497.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11235&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FreeRADIUS mishandles the &amp;quot;each participant verifies that the received
scalar is within a range, and that the received group element is a valid
point on the curve being used&amp;quot; protection mechanism, aka a &amp;quot;Dragonblood&amp;quot;
issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13456&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In FreeRADIUS 3.0 on average 1 in every 2048 EAP-pwd handshakes fails
because the password element cannot be found within 10 iterations of the
hunting and pecking loop. This leaks information that an attacker can use
to recover the password of any user. This information leakage is similar to
the &amp;quot;Dragonblood&amp;quot; attack and CVE-2019-9494.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17185&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In FreeRADIUS 3.0.x the EAP-pwd module used a global OpenSSL
BN_CTX instance to handle all handshakes. This mean multiple threads use the
same BN_CTX instance concurrently, resulting in crashes when concurrent
EAP-pwd handshakes are initiated. This can be abused by an adversary as a
Denial-of-Service (DoS) attack.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-808-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-808-1-git/</link>
      <pubDate>Fri, 24 Feb 2023 14:39:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-808-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-808-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.1.4-2.1&amp;#43;deb8u13 (jessie), 1:2.11.0-3&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22490&#34;&gt;CVE-2023-22490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23946&#34;&gt;CVE-2023-23946&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in git, a fast, scalable
and distributed revision control system.&lt;/p&gt;
&lt;p&gt;CVE-2023-22490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;yvvdwf found a data exfiltration vulnerability while performing a local
clone from a malicious repository even using a non-local transport.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-23946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Joern Schneeweisz found a path traversal vulnerbility in git-apply
that a path outside the working tree can be overwritten as the acting
user.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-807-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-807-1-openssl/</link>
      <pubDate>Wed, 22 Feb 2023 10:25:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-807-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-807-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u20 (jessie), 1.1.0l-1~deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0215&#34;&gt;CVE-2023-0215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0286&#34;&gt;CVE-2023-0286&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit, which may result in denial of service or
information disclosure.&lt;/p&gt;
&lt;p&gt;Additional details can be found &lt;a href=&#34;https://www.openssl.org/news/secadv/20230207.txt&#34;&gt;in the upstream advisory&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-806-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-806-1-tiff/</link>
      <pubDate>Wed, 22 Feb 2023 00:04:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-806-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-806-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u15 (jessie), 4.0.8-2&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0795&#34;&gt;CVE-2023-0795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0796&#34;&gt;CVE-2023-0796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0797&#34;&gt;CVE-2023-0797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0798&#34;&gt;CVE-2023-0798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0799&#34;&gt;CVE-2023-0799&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0800&#34;&gt;CVE-2023-0800&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0801&#34;&gt;CVE-2023-0801&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0802&#34;&gt;CVE-2023-0802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0803&#34;&gt;CVE-2023-0803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0804&#34;&gt;CVE-2023-0804&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several flaws were found in tiffcrop, a program distributed by tiff, a library
and tools providing support for the Tag Image File Format (TIFF). A specially
crafted tiff file can lead to an out-of-bounds write or read resulting in a
denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-805-1 libgit2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-805-1-libgit2/</link>
      <pubDate>Tue, 21 Feb 2023 21:40:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-805-1-libgit2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-805-1-libgit2/">
      
&lt;p&gt;Package : libgit2&lt;/p&gt;


&lt;p&gt;Version : 0.25.1&amp;#43;really0.24.6-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22742&#34;&gt;CVE-2023-22742&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability have been found in libgit2, a cross-platform, linkable
library implementation of Git.&lt;/p&gt;
&lt;p&gt;Previous versions of libgit&amp;rsquo;s SSH backend did by default not perform
certificate checking if the caller did not explicitly provide a
certificate check callback and so may be subjected to a
man-in-the-middle attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-804-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-804-1-libarchive/</link>
      <pubDate>Tue, 21 Feb 2023 16:14:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-804-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-804-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.1.2-11&amp;#43;deb8u11 (jessie)&lt;/p&gt;


      &lt;p&gt;This update fixes the build on armhf, which was preventing security
updates from reaching that architecture.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-803-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-803-1-git/</link>
      <pubDate>Tue, 21 Feb 2023 14:41:10 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-803-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-803-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.1.4-2.1&amp;#43;deb8u12 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23521&#34;&gt;CVE-2022-23521&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24765&#34;&gt;CVE-2022-24765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29187&#34;&gt;CVE-2022-29187&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39253&#34;&gt;CVE-2022-39253&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39260&#34;&gt;CVE-2022-39260&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41903&#34;&gt;CVE-2022-41903&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in Git, a distributed revision control system.
An attacker may trigger remote code execution, cause local users into
executing arbitrary commands, leak information from the local filesystem,
and bypass restricted shell.&lt;/p&gt;
&lt;p&gt;This update includes two changes of behavior that may affect certain setup:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It stops when directory traversal changes ownership from the current
user while looking for a top-level git directory, a user could make an
exception by using the new safe.directory configuration.&lt;/li&gt;
&lt;li&gt;The default of protocol.file.allow has been changed from &amp;ldquo;always&amp;rdquo; to
&amp;ldquo;user&amp;rdquo;.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-802-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-802-1-nss/</link>
      <pubDate>Tue, 21 Feb 2023 01:15:06 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-802-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-802-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u17 (jessie), 2:3.26.2-1.1&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0767&#34;&gt;CVE-2023-0767&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Christian Holler discovered that incorrect handling of PKCS 12 Safe Bag
attributes in nss, the Mozilla Network Security Service library, may result in
execution of arbitrary code if a specially crafted PKCS 12 certificate bundle
is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-801-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-801-1-clamav/</link>
      <pubDate>Mon, 20 Feb 2023 18:54:40 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-801-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-801-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.103.8&amp;#43;dfsg-0&amp;#43;deb8u1 (jessie), 0.103.8&amp;#43;dfsg-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20032&#34;&gt;CVE-2023-20032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-20052&#34;&gt;CVE-2023-20052&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been found in the ClamAV antivirus toolkit,
which could result in arbitrary code execution or information disclosure
when parsing maliciously crafted HFS+ or DMG files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-800-1 c-ares security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-800-1-c-ares/</link>
      <pubDate>Sun, 19 Feb 2023 00:36:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-800-1-c-ares/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-800-1-c-ares/">
      
&lt;p&gt;Package : c-ares&lt;/p&gt;


&lt;p&gt;Version : 1.10.0-2&amp;#43;deb8u4 (jessie), 1.12.0-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4904&#34;&gt;CVE-2022-4904&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that in c-ares, an asynchronous name resolver library, the
config_sortlist function is missing checks about the validity of the input
string, which allows a possible arbitrary length stack overflow and thus may
cause a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-799-1 asterisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-799-1-asterisk/</link>
      <pubDate>Fri, 17 Feb 2023 00:51:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-799-1-asterisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-799-1-asterisk/">
      
&lt;p&gt;Package : asterisk&lt;/p&gt;


&lt;p&gt;Version : 1:13.14.1~dfsg-2&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37325&#34;&gt;CVE-2022-37325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42706&#34;&gt;CVE-2022-42706&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were discovered in Asterisk, an Open Source
Private Branch Exchange.&lt;/p&gt;
&lt;p&gt;CVE-2022-37325&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed
Calling or Called Party IE can cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42706&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GetConfig, via Asterisk Manager Interface, allows a connected application
to access files outside of the asterisk configuration directory, aka
Directory Traversal.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-546-2 pillow regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-546-2-pillow/</link>
      <pubDate>Tue, 14 Feb 2023 09:27:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-546-2-pillow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-546-2-pillow/">
      
&lt;p&gt;Package : pillow&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-2&amp;#43;deb8u8 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28675&#34;&gt;CVE-2021-28675&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The patch to address CVE-2021-28675 in Pillow 2.6.1-2+deb8u7 raised
OSError exceptions when processing truncated files. This version has
been updated to raise IOError exceptions instead, which makes Pillow
itself handle the error, making it more transparent to users.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-780-2 curl regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-780-2-curl/</link>
      <pubDate>Fri, 10 Feb 2023 09:53:20 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-780-2-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-780-2-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u25 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27774&#34;&gt;CVE-2022-27774&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The patches for CVE-2022-27774 caused a regression in libcurl which could
result in a segmentation fault.  The root cause has been identified and the
patches have been revised.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-798-1 sox security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-798-1-sox/</link>
      <pubDate>Fri, 10 Feb 2023 13:36:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-798-1-sox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-798-1-sox/">
      
&lt;p&gt;Package : sox&lt;/p&gt;


&lt;p&gt;Version : 14.4.1-5&amp;#43;deb8u5 (jessie), 14.4.1-5&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13590&#34;&gt;CVE-2019-13590&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3643&#34;&gt;CVE-2021-3643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23159&#34;&gt;CVE-2021-23159&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23172&#34;&gt;CVE-2021-23172&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23210&#34;&gt;CVE-2021-23210&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33844&#34;&gt;CVE-2021-33844&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40426&#34;&gt;CVE-2021-40426&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31650&#34;&gt;CVE-2022-31650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31651&#34;&gt;CVE-2022-31651&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes multiple file format validation vulnerabilities that could
result in memory access violations such as buffer overflows and floating point
exceptions. It also fixes a regression in hcom parsing introduced when fixing
CVE-2017-11358.&lt;/p&gt;
&lt;p&gt;CVE-2019-13590&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In sox-fmt.h (startread function), there is an integer overflow on the
result of integer addition (wraparound to 0) fed into the lsx_calloc macro
that wraps malloc. When a NULL pointer is returned, it is used without a
prior check that it is a valid pointer, leading to a NULL pointer
dereference on lsx_readbuf in formats_i.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3643&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The lsx_adpcm_init function within libsox leads to a
global-buffer-overflow. This flaw allows an attacker to input a malicious
file, leading to the disclosure of sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23159&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in SoX, where a heap-buffer-overflow occurs
in function lsx_read_w_buf() in formats_i.c file. The vulnerability is
exploitable with a crafted file, that could cause an application to
crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23172&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was found in SoX, where a heap-buffer-overflow occurs
in function startread() in hcom.c file. The vulnerability is
exploitable with a crafted hcomn file, that could cause an application
to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23210&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A floating point exception (divide-by-zero) issue was discovered in
SoX in functon read_samples() of voc.c file. An attacker with a
crafted file, could cause an application to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33844&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A floating point exception (divide-by-zero) issue was discovered in
SoX in functon startread() of wav.c file. An attacker with a crafted
wav file, could cause an application to crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40426&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-based buffer overflow vulnerability exists in the sphere.c
start_read() functionality of Sound Exchange libsox. A specially-crafted
file can lead to a heap buffer overflow. An attacker can provide a
malicious file to trigger this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31650&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a floating-point exception in lsx_aiffstartwrite in aiff.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31651&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an assertion failure in rate_init in rate.c.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-797-1 heimdal security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-797-1-heimdal/</link>
      <pubDate>Thu, 09 Feb 2023 13:19:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-797-1-heimdal/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-797-1-heimdal/">
      
&lt;p&gt;Package : heimdal&lt;/p&gt;


&lt;p&gt;Version : 1.6~rc2&amp;#43;dfsg-9&amp;#43;deb8u3 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16860&#34;&gt;CVE-2018-16860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14870&#34;&gt;CVE-2019-14870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3671&#34;&gt;CVE-2021-3671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44758&#34;&gt;CVE-2021-44758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3437&#34;&gt;CVE-2022-3437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41916&#34;&gt;CVE-2022-41916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42898&#34;&gt;CVE-2022-42898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44640&#34;&gt;CVE-2022-44640&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes several vulnerabilities in heimdal, an implementation of
kerberos.&lt;/p&gt;
&lt;p&gt;CVE-2018-16860&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the Heimdal KDC implementation. A man in the middle
attacker could use this flaw to intercept the request to the KDC and
replace the user name (principal) in the request with any desired user name
(principal) that exists in the KDC effectively obtaining a ticket for that
principal.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14870&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper validation of forwarded kerberos tickets.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3671&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A null pointer de-reference was found in the way heimdal kdc handled
missing sname in TGS-REQ (Ticket Granting Server - Request). An
authenticated user could use this flaw to crash the kdc.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44758&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal allows attackers to cause a NULL pointer dereference in a SPNEGO
acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero
initial_response value to send_accept.    
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3437&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-based buffer overflow vulnerability was found within the GSSAPI
unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES
decryption routines in the Heimdal GSSAPI library allow a length-limited
write buffer overflow on malloc() allocated memory when presented with a
maliciously small packet. This flaw allows a remote user to send specially
crafted malicious data to the application, possibly resulting in a denial
of service (DoS) attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41916&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. It was
vulnerable to a denial of service vulnerability in the PKI certificate
validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT),
as well as any third-party applications using Heimdal&#39;s libhx509.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42898&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PAC parsing in heimdal has integer overflows that may lead to remote code
execution (in KDC, kadmind, or a GSS or Kerberos application server) on
32-bit platforms (which have a resultant heap-based buffer overflow), and
cause a denial of service on other platforms. This occurs in krb5_pac_parse
in lib/krb5/krb/pac.c in MIT Kerberos. The bug for heimdal is similar.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal allows remote attackers to execute arbitrary code because of an
invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Note that there also is a version 1.6~rc2+dfsg-9+deb8u2, which had a build
failure on 32bit architectures.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-796-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-796-1-wireshark/</link>
      <pubDate>Wed, 08 Feb 2023 22:02:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-796-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-796-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 2.6.20-0&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4345&#34;&gt;CVE-2022-4345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0411&#34;&gt;CVE-2023-0411&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0412&#34;&gt;CVE-2023-0412&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0413&#34;&gt;CVE-2023-0413&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0415&#34;&gt;CVE-2023-0415&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0417&#34;&gt;CVE-2023-0417&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in Wireshark, a
network traffic analyzer. An attacker could cause a denial of service
(infinite loop or application crash) via packet injection or a crafted
capture file.&lt;/p&gt;
&lt;p&gt;CVE-2022-4345&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in
Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via
packet injection or crafted capture file
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0411&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and
3.6.0 to 3.6.10 and allows denial of service via packet injection or
crafted capture file
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0412&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and
allows denial of service via packet injection or crafted capture file
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0413&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10
and allows denial of service via packet injection or crafted capture
file
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0415&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10
and allows denial of service via packet injection or crafted capture
file
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-0417&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0
to 3.6.10 and allows denial of service via packet injection or crafted
capture file
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-795-1 heimdal security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-795-1-heimdal/</link>
      <pubDate>Wed, 08 Feb 2023 13:15:06 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-795-1-heimdal/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-795-1-heimdal/">
      
&lt;p&gt;Package : heimdal&lt;/p&gt;


&lt;p&gt;Version : 7.1.0&amp;#43;dfsg-13&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14870&#34;&gt;CVE-2019-14870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3671&#34;&gt;CVE-2021-3671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44758&#34;&gt;CVE-2021-44758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3437&#34;&gt;CVE-2022-3437&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41916&#34;&gt;CVE-2022-41916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42898&#34;&gt;CVE-2022-42898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44640&#34;&gt;CVE-2022-44640&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes several vulnerabilities in heimdal, an implementation of
kerberos.&lt;/p&gt;
&lt;p&gt;CVE-2019-14870&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper validation of forwarded kerberos tickets.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3671&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A null pointer de-reference was found in the way heimdal kdc handled
missing sname in TGS-REQ (Ticket Granting Server - Request). An
authenticated user could use this flaw to crash the kdc.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44758&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal allows attackers to cause a NULL pointer dereference in a SPNEGO
acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero
initial_response value to send_accept.    
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3437&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-based buffer overflow vulnerability was found within the GSSAPI
unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES
decryption routines in the Heimdal GSSAPI library allow a length-limited
write buffer overflow on malloc() allocated memory when presented with a
maliciously small packet. This flaw allows a remote user to send specially
crafted malicious data to the application, possibly resulting in a denial
of service (DoS) attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41916&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. It was
vulnerable to a denial of service vulnerability in the PKI certificate
validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT),
as well as any third-party applications using Heimdal&#39;s libhx509.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42898&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;PAC parsing in heimdal has integer overflows that may lead to remote code
execution (in KDC, kadmind, or a GSS or Kerberos application server) on
32-bit platforms (which have a resultant heap-based buffer overflow), and
cause a denial of service on other platforms. This occurs in krb5_pac_parse
in lib/krb5/krb/pac.c in MIT Kerberos. The bug for heimdal is similar.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-44640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heimdal allows remote attackers to execute arbitrary code because of an
invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-794-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-794-1-xorg-server/</link>
      <pubDate>Tue, 07 Feb 2023 11:23:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-794-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-794-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u10 (jessie), 2:1.19.2-1&amp;#43;deb9u13 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-0494&#34;&gt;CVE-2023-0494&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn, working with Trend Micro Zero Day Initiative, discovered
a vulnerability in the X.Org X server.
A potential use after free mighty result in local privilege escalation if
the X server is running privileged or remote code execution during ssh X
forwarding sessions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-793-1 python3.4 bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-793-1-python3.4/</link>
      <pubDate>Mon, 06 Feb 2023 09:43:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-793-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-793-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u13 (jessie)&lt;/p&gt;


      &lt;p&gt;This update fixes the build on armhf, which was preventing security
updates from reaching that architecture.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-792-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-792-1-modsecurity-apache/</link>
      <pubDate>Fri, 03 Feb 2023 20:42:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-792-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-792-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.8.0-3&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48279&#34;&gt;CVE-2022-48279&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A issues was found in modsecurity-apache, open source, cross
platform web application firewall (WAF) engine for Apache which allows
remote attackers to bypass the applications firewall.&lt;/p&gt;
&lt;p&gt;CVE-2022-48279&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart
requests were incorrectly parsed and could bypass the Web Application
Firewall.
NOTE: this is related to CVE-2022-39956 but can be considered
independent changes to the ModSecurity (C language) codebase.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-791-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-791-1-python-django/</link>
      <pubDate>Wed, 01 Feb 2023 13:26:35 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-791-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-791-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u16 (jessie), 1:1.10.7-2&amp;#43;deb9u19 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-23969&#34;&gt;CVE-2023-23969&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential Denial of Service (DoS)
vulnerability in Django, a popular Python-based web development framework.&lt;/p&gt;
&lt;p&gt;Parsed values of the Accept-Language HTTP headers are cached by Django order to
avoid repetitive parsing. This could have led to a potential denial-of-service
attack via excessive memory usage if the raw value of Accept-Language headers
was very large.&lt;/p&gt;
&lt;p&gt;Accept-Language headers are now limited to a maximum length specifically in
order to avoid this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-790-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-790-1-libarchive/</link>
      <pubDate>Tue, 31 Jan 2023 23:17:56 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-790-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-790-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.1.2-11&amp;#43;deb8u10 (jessie), 3.2.2-2&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36227&#34;&gt;CVE-2022-36227&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libarchive, a multi-format archive and compression library.
Due to missing checks after calloc, null pointer dereferences might happen.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-789-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-789-1-openjdk-8/</link>
      <pubDate>Tue, 31 Jan 2023 16:15:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-789-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-789-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u362-ga-1~deb8u1 (jessie), 8u362-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21830&#34;&gt;CVE-2023-21830&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-21843&#34;&gt;CVE-2023-21843&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-788-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-788-1-git/</link>
      <pubDate>Tue, 31 Jan 2023 08:54:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-788-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-788-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.11.0-3&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23521&#34;&gt;CVE-2022-23521&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24765&#34;&gt;CVE-2022-24765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29187&#34;&gt;CVE-2022-29187&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39253&#34;&gt;CVE-2022-39253&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39260&#34;&gt;CVE-2022-39260&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41903&#34;&gt;CVE-2022-41903&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in Git, a distributed revision control system.
An attacker may trigger remote code execution, cause local users into
executing arbitrary commands, leak information from the local filesystem,
and bypass restricted shell.&lt;/p&gt;
&lt;p&gt;This update includes two changes of behavior that may affect certain setup:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It stops when directory traversal changes ownership from the current
user while looking for a top-level git directory, a user could make an
exception by using the new safe.directory configuration.&lt;/li&gt;
&lt;li&gt;The default of protocol.file.allow has been changed from &amp;ldquo;always&amp;rdquo; to
&amp;ldquo;user&amp;rdquo;.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-787-1 ruby-sinatra security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-787-1-ruby-sinatra/</link>
      <pubDate>Tue, 31 Jan 2023 04:15:45 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-787-1-ruby-sinatra/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-787-1-ruby-sinatra/">
      
&lt;p&gt;Package : ruby-sinatra&lt;/p&gt;


&lt;p&gt;Version : 1.4.7-5&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45442&#34;&gt;CVE-2022-45442&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Sinatra is a domain-specific language for creating web applications in Ruby.
An application is vulnerable to a reflected file download (RFD) attack that
sets the Content-Disposition header of a response when the filename is derived
from user-supplied input.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-786-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-786-1-tiff/</link>
      <pubDate>Mon, 30 Jan 2023 23:42:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-786-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-786-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u14 (jessie), 4.0.8-2&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0865&#34;&gt;CVE-2022-0865&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0891&#34;&gt;CVE-2022-0891&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0907&#34;&gt;CVE-2022-0907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0908&#34;&gt;CVE-2022-0908&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0909&#34;&gt;CVE-2022-0909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0924&#34;&gt;CVE-2022-0924&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1355&#34;&gt;CVE-2022-1355&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2056&#34;&gt;CVE-2022-2056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2057&#34;&gt;CVE-2022-2057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2058&#34;&gt;CVE-2022-2058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2867&#34;&gt;CVE-2022-2867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2868&#34;&gt;CVE-2022-2868&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2869&#34;&gt;CVE-2022-2869&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3570&#34;&gt;CVE-2022-3570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3597&#34;&gt;CVE-2022-3597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3598&#34;&gt;CVE-2022-3598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3599&#34;&gt;CVE-2022-3599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3626&#34;&gt;CVE-2022-3626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3627&#34;&gt;CVE-2022-3627&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3970&#34;&gt;CVE-2022-3970&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34526&#34;&gt;CVE-2022-34526&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48281&#34;&gt;CVE-2022-48281&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in tiff, a library and tools providing
support for the Tag Image File Format (TIFF), leading to denial of service
(DoS) and possibly local code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-785-1 ruby-rack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-785-1-ruby-rack/</link>
      <pubDate>Tue, 31 Jan 2023 04:10:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-785-1-ruby-rack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-785-1-ruby-rack/">
      
&lt;p&gt;Package : ruby-rack&lt;/p&gt;


&lt;p&gt;Version : 1.6.4-4&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44570&#34;&gt;CVE-2022-44570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44571&#34;&gt;CVE-2022-44571&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A couple of ReDoS vulnerabilities were found in multipart parser and
Rack::Utils.byte_ranges in ruby-rack, a modular Ruby webserver interface.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-784-1 ruby-git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-784-1-ruby-git/</link>
      <pubDate>Tue, 31 Jan 2023 04:07:49 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-784-1-ruby-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-784-1-ruby-git/">
      
&lt;p&gt;Package : ruby-git&lt;/p&gt;


&lt;p&gt;Version : 1.2.8-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25648&#34;&gt;CVE-2022-25648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46648&#34;&gt;CVE-2022-46648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47318&#34;&gt;CVE-2022-47318&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A couple of vulnerabilities were reported against ruby-git, a Ruby
interface to the Git revision control system, that could lead to a
command injection and execution of an arbitrary ruby code by having
a user to load a repository containing a specially crafted filename
to the product.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-783-1 modsecurity-crs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-783-1-modsecurity-crs/</link>
      <pubDate>Mon, 30 Jan 2023 19:44:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-783-1-modsecurity-crs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-783-1-modsecurity-crs/">
      
&lt;p&gt;Package : modsecurity-crs&lt;/p&gt;


&lt;p&gt;Version : 3.2.3-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16384&#34;&gt;CVE-2018-16384&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13464&#34;&gt;CVE-2019-13464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-22669&#34;&gt;CVE-2020-22669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35368&#34;&gt;CVE-2021-35368&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39955&#34;&gt;CVE-2022-39955&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39956&#34;&gt;CVE-2022-39956&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39957&#34;&gt;CVE-2022-39957&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39958&#34;&gt;CVE-2022-39958&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in modsecurity-crs, a set of generic attack
detection rules for use with ModSecurity or compatible web application
firewalls, which allows remote attackers to bypass the web applications
firewall.&lt;/p&gt;
&lt;p&gt;If you are using modsecurity-crs with apache2 / libapache2-modsecurity, please
make sure to review your modsecurity configuration, usually
/etc/modsecurity/modsecurity.conf, against the updated recommended
configration, available in /etc/modsecurity/modsecurity.conf-recommended:
Some of the changes to the recommended rules are required to avoid WAF bypasses
in certain circumstances.&lt;/p&gt;
&lt;p&gt;Please note that CVE-2022-39956 requires an updated modsecurity-apache packge,
which has been previously uploaded to buster-security, see Debian ELTS Advisory
ELA-779-1 for details.&lt;/p&gt;
&lt;p&gt;Kudos to @airween for the support and help while perparing the update.&lt;/p&gt;
&lt;p&gt;CVE-2018-16384&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A SQL injection bypass (aka PL1 bypass) exists in OWASP ModSecurity Core Rule
Set (owasp-modsecurity-crs) through v3.1.0-rc3 via {`a`b} where a is a special
function name (such as &amp;quot;if&amp;quot;) and b is the SQL statement to be executed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13464&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2.
Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads
rules, because PHP automatically transforms dots into underscores in
certain contexts where dots are invalid.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-22669&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL
injection bypass vulnerability. Attackers can use the comment characters
and variable assignments in the SQL syntax to bypass Modsecurity WAF 
protection and implement SQL injection attacks on Web applications.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-35368&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;OWASP ModSecurity Core Rule Set 3.1.x before 3.1.2, 3.2.x before 3.2.1,
and 3.3.x before 3.3.2 is affected by a Request Body Bypass via a 
trailing pathname.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39955&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set
bypass by submitting a specially crafted HTTP Content-Type header field that
indicates multiple character encoding schemes. A vulnerable back-end can
potentially be exploited by declaring multiple Content-Type &amp;quot;charset&amp;quot; names and
therefore bypassing the configurable CRS Content-Type header &amp;quot;charset&amp;quot; allow
list. An encoded payload can bypass CRS detection this way and may then be
decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected,
as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and
users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39956&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set
bypass for HTTP multipart requests by submitting a payload that uses a
character encoding scheme via the Content-Type or the deprecated
Content-Transfer-Encoding multipart MIME header fields that will not be decoded
and inspected by the web application firewall engine and the rule set. The
multipart payload will therefore bypass detection. A vulnerable backend that
supports these encoding schemes can potentially be exploited. The legacy CRS
versions 3.0.x and 3.1.x are affected, as well as the currently supported
versions 3.2.1 and 3.3.2. Integrators and users are advised upgrade to 3.2.2
and 3.3.3 respectively. The mitigation against these vulnerabilities depends on
the installation of the latest ModSecurity version (v2.9.6 / v3.0.8).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39957&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body
bypass. A client can issue an HTTP Accept header field containing an optional
&amp;quot;charset&amp;quot; parameter in order to receive the response in an encoded form.
Depending on the &amp;quot;charset&amp;quot;, this response can not be decoded by the web
application firewall. A restricted resource, access to which would ordinarily
be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and
3.1.x are affected, as well as the currently supported versions 3.2.1 and
3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3
respectively.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39958&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass
to sequentially exfiltrate small and undetectable sections of data by
repeatedly submitting an HTTP Range header field with a small byte range. A
restricted resource, access to which would ordinarily be detected, may be
exfiltrated from the backend, despite being protected by a web application
firewall that uses CRS. Short subsections of a restricted resource may bypass
pattern matching techniques and allow undetected access. The legacy CRS
versions 3.0.x and 3.1.x are affected, as well as the currently supported
versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2
and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-782-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-782-1-xorg-server/</link>
      <pubDate>Sun, 29 Jan 2023 13:33:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-782-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-782-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u9 (jessie), 2:1.19.2-1&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4283&#34;&gt;CVE-2022-4283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46340&#34;&gt;CVE-2022-46340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46341&#34;&gt;CVE-2022-46341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46342&#34;&gt;CVE-2022-46342&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46343&#34;&gt;CVE-2022-46343&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-46344&#34;&gt;CVE-2022-46344&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered several vulnerabilities in X server extensions in the X.Org X server, which may result in privilege escalation if the X server is running privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-781-1 libzen security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-781-1-libzen/</link>
      <pubDate>Sun, 29 Jan 2023 01:16:40 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-781-1-libzen/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-781-1-libzen/">
      
&lt;p&gt;Package : libzen&lt;/p&gt;


&lt;p&gt;Version : 0.4.34-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36646&#34;&gt;CVE-2020-36646&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Crafted arguments to a function could lead to an unchecked return value
and a null pointer dereference.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-780-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-780-1-curl/</link>
      <pubDate>Sat, 28 Jan 2023 16:29:20 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-780-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-780-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u24 (jessie), 7.52.1-5&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27774&#34;&gt;CVE-2022-27774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27782&#34;&gt;CVE-2022-27782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32221&#34;&gt;CVE-2022-32221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-35252&#34;&gt;CVE-2022-35252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43552&#34;&gt;CVE-2022-43552&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in Curl, an easy-to-use client-side
URL transfer library, which could result in denial of service or
information disclosure.&lt;/p&gt;
&lt;p&gt;This update also revises the fix for CVE-2022-27782 released for stretch in
ELA-664-1.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-779-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-779-1-modsecurity-apache/</link>
      <pubDate>Thu, 26 Jan 2023 19:48:35 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-779-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-779-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.9.1-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-48279&#34;&gt;CVE-2022-48279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-24021&#34;&gt;CVE-2023-24021&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in modsecurity-apache, open source, cross
platform web application firewall (WAF) engine for Apache which allows
remote attackers to bypass the applications firewall and other
unspecified impact.&lt;/p&gt;
&lt;p&gt;CVE-2022-48279&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart
requests were incorrectly parsed and could bypass the Web Application
Firewall.
NOTE: this is related to CVE-2022-39956 but can be considered
independent changes to the ModSecurity (C language) codebase.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2023-24021&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Incorrect handling of null-bytes in file uploads in ModSecurity
before 2.9.7 may allow for Web Application Firewall bypasses and
buffer overflows on the Web Application Firewall when executing
rules reading the FILES_TMP_CONTENT collection.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-778-1 libde265 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-778-1-libde265/</link>
      <pubDate>Thu, 26 Jan 2023 16:32:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-778-1-libde265/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-778-1-libde265/">
      
&lt;p&gt;Package : libde265&lt;/p&gt;


&lt;p&gt;Version : 1.0.2-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21594&#34;&gt;CVE-2020-21594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21595&#34;&gt;CVE-2020-21595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21596&#34;&gt;CVE-2020-21596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21597&#34;&gt;CVE-2020-21597&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21598&#34;&gt;CVE-2020-21598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21600&#34;&gt;CVE-2020-21600&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21601&#34;&gt;CVE-2020-21601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21602&#34;&gt;CVE-2020-21602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21603&#34;&gt;CVE-2020-21603&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21604&#34;&gt;CVE-2020-21604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21605&#34;&gt;CVE-2020-21605&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21606&#34;&gt;CVE-2020-21606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43235&#34;&gt;CVE-2022-43235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43236&#34;&gt;CVE-2022-43236&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43237&#34;&gt;CVE-2022-43237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43238&#34;&gt;CVE-2022-43238&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43239&#34;&gt;CVE-2022-43239&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43240&#34;&gt;CVE-2022-43240&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43241&#34;&gt;CVE-2022-43241&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43242&#34;&gt;CVE-2022-43242&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43243&#34;&gt;CVE-2022-43243&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43244&#34;&gt;CVE-2022-43244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43245&#34;&gt;CVE-2022-43245&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43248&#34;&gt;CVE-2022-43248&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43249&#34;&gt;CVE-2022-43249&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43250&#34;&gt;CVE-2022-43250&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43252&#34;&gt;CVE-2022-43252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43253&#34;&gt;CVE-2022-43253&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47655&#34;&gt;CVE-2022-47655&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in libde265, an open source implementation of the
H.265 video codec, which may result in denial of or have unspecified other
impact.&lt;/p&gt;
&lt;p&gt;CVE-2020-21594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback
function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21595&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the mc_luma function,
which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21596&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a global buffer overflow in the
decode_CABAC_bit function, which can be exploited via a crafted a
file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21597&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma
function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21598&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the
ff_hevc_put_unweighted_pred_8_sse function, which can be exploited
via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21600&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the
put_weighted_pred_avg_16_fallback function, which can be exploited via a
crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21601&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallback
function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21602&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the
put_weighted_bipred_16_fallback function, which can be exploited via a crafted
a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21603&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the
put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21604&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow fault in the
_mm_loadl_epi64 function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21605&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a segmentation fault in the apply_sao_internal
function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-21606&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow fault in the
put_epel_16_fallback function, which can be exploited via a crafted a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43235&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43236&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow
vulnerability via put_qpel_fallback&amp;lt;unsigned short&amp;gt; in fallback-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43237&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow
vulnerability via void put_epel_hv_fallback&amp;lt;unsigned short&amp;gt; in
fallback-motion.cc. This vulnerability allows attackers to cause a Denial of
Service (DoS) via a crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43238&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain an unknown crash via
ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows
attackers to cause a Denial of Service (DoS) via a crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43239&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via mc_chroma&amp;lt;unsigned short&amp;gt; in motion.cc. This vulnerability
allows attackers to cause a Denial of Service (DoS) via a crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43240&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via ff_hevc_put_hevc_qpel_h_2_v_1_sse in sse-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43241&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain an unknown crash via
ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability allows
attackers to cause a Denial of Service (DoS) via a crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43242&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via mc_luma&amp;lt;unsigned char&amp;gt; in motion.cc. This vulnerability
allows attackers to cause a Denial of Service (DoS) via a crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43243&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in sse-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43244&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via put_qpel_fallback&amp;lt;unsigned short&amp;gt; in fallback-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43245&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a segmentation violation via
apply_sao_internal&amp;lt;unsigned short&amp;gt; in sao.cc. This vulnerability allows
attackers to cause a Denial of Service (DoS) via a crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43248&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via put_weighted_pred_avg_16_fallback in fallback-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43249&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via put_epel_hv_fallback&amp;lt;unsigned short&amp;gt; in fallback-motion.cc.
This vulnerability allows attackers to cause a Denial of Service (DoS) via a
crafted video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43250&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc.  This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43252&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via put_epel_16_fallback in fallback-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43253&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow
vulnerability via put_unweighted_pred_16_fallback in fallback-motion.cc. This
vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted
video file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Libde265 1.0.9 is vulnerable to Buffer Overflow in function void
put_qpel_fallback&amp;lt;unsigned short&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-777-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-777-1-php5/</link>
      <pubDate>Tue, 24 Jan 2023 15:22:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-777-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-777-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u16 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21707&#34;&gt;CVE-2021-21707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31625&#34;&gt;CVE-2022-31625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31626&#34;&gt;CVE-2022-31626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31628&#34;&gt;CVE-2022-31628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31629&#34;&gt;CVE-2022-31629&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in PHP, a widely-used open
source general purpose scripting language which could result in denial
of service, information disclosure, insecure cookie handling or
potentially the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-776-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-776-1-linux-4.19/</link>
      <pubDate>Tue, 24 Jan 2023 10:04:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-776-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-776-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.269-1~deb8u1 (jessie), 4.19.269-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2978&#34;&gt;CVE-2022-2978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3521&#34;&gt;CVE-2022-3521&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3524&#34;&gt;CVE-2022-3524&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3564&#34;&gt;CVE-2022-3564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3565&#34;&gt;CVE-2022-3565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3594&#34;&gt;CVE-2022-3594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3621&#34;&gt;CVE-2022-3621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3628&#34;&gt;CVE-2022-3628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3640&#34;&gt;CVE-2022-3640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3643&#34;&gt;CVE-2022-3643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3646&#34;&gt;CVE-2022-3646&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3649&#34;&gt;CVE-2022-3649&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4378&#34;&gt;CVE-2022-4378&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20369&#34;&gt;CVE-2022-20369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29901&#34;&gt;CVE-2022-29901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40768&#34;&gt;CVE-2022-40768&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41849&#34;&gt;CVE-2022-41849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41850&#34;&gt;CVE-2022-41850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42328&#34;&gt;CVE-2022-42328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42329&#34;&gt;CVE-2022-42329&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42895&#34;&gt;CVE-2022-42895&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42896&#34;&gt;CVE-2022-42896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43750&#34;&gt;CVE-2022-43750&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2022-2978&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;butt3rflyh4ck&amp;quot;, Hao Sun, and Jiacheng Xu reported a flaw in the
nilfs2 filesystem driver which can lead to a use-after-free.  A
local use might be able to exploit this to cause a denial of
service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3521&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the KCM subsystem
which could lead to a crash.

This subsystem is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3524&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the IPv6 stack which
could lead to a memory leak.  A local user could exploit this to
cause a denial of service (memory exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3564&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the Bluetooh L2CAP subsystem which
would lead to a use-after-free.  This might be exploitable
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3565&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the mISDN driver which would lead to a
use-after-free.  This might be exploitable to cause a denial of
service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andrew Gaul reported that the r8152 Ethernet driver would log
excessive numbers of messages in response to network errors.  A
remote attacker could possibly exploit this to cause a denial of
service (resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3621, CVE-2022-3646&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found flaws in the nilfs2 filesystem driver which
can lead to a null pointer dereference or memory leak.  A user
permitted to mount arbitrary filesystem images could use these to
cause a denial of service (crash or resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3628&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dokyung Song, Jisoo Jang, and Minsuk Kang reported a potential
heap-based buffer overflow in the brcmfmac Wi-Fi driver.  A user
able to connect a malicious USB device could exploit this to cause
a denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the Bluetooh L2CAP subsystem which
would lead to a use-after-free.  This might be exploitable
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3643 (XSA-423)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the Xen network backend driver that would
result in it generating malformed packet buffers.  If these
packets were forwarded to certain other network devices, a Xen
guest could exploit this to cause a denial of service (crash or
device reset).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3649&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found flaws in the nilfs2 filesystem driver which
can lead to a use-after-free.  A user permitted to mount arbitrary
filesystem images could use these to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4378&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng found a flaw in procfs that would cause a stack-based
buffer overflow.  A local user permitted to write to a sysctl
could use this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-20369&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the v4l2-mem2mem media driver that would lead
to an out-of-bounds write.  A local user with access to such a
device could exploit this for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-29901&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Johannes Wikner and Kaveh Razavi reported that for Intel
processors (Intel Core generation 6, 7 and 8), protections against
speculative branch target injection attacks were insufficient in
some circumstances, which may allow arbitrary speculative code
execution under certain microarchitecture-dependent conditions.

More information can be found at
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-40768&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;hdthky&amp;quot; reported that the stex SCSI adapter driver did not fully
initialise a structure that is copied to user-space.  A local user
with access to such a device could exploit this to leak sensitive
information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41849&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the smscufx graphics driver,
which could lead to a use-after-free.  A user able to remove the
physical device while also accessing its device node could exploit
this to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41850&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the hid-roccat input driver,
which could lead to a use-after-free.  A local user able to access
such a device could exploit this to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42328, CVE-2022-42329 (XSA-424)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yang Yingliang reported that the Xen network backend driver did
not use the proper function to free packet buffers in one case,
which could lead to a deadlock.  A Xen guest could exploit this to
cause a denial of service (hang).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42895&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tamás Koczka reported a flaw in the Bluetooh L2CAP subsystem
that would result in reading uninitialised memory.  A nearby
attacker able to make a Bluetooth connection could exploit
this to leak sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42896&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tamás Koczka reported flaws in the Bluetooh L2CAP subsystem that
can lead to a use-after-free.  A nearby attacker able to make a
Bluetooth SMP connection could exploit this to cause a denial of
service (crash or memory corruption) or possibly for remote code
execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43750&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found that the USB monitor (usbmon) driver allowed
user-space programs to overwrite the driver&#39;s data structures.  A
local user permitted to access a USB monitor device could exploit
this to cause a denial of service (memory corruption or crash) or
possibly for privilege escalation.  However, by default only the
root user can access such devices.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-775-1 php7.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-775-1-php7.0/</link>
      <pubDate>Tue, 24 Jan 2023 09:44:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-775-1-php7.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-775-1-php7.0/">
      
&lt;p&gt;Package : php7.0&lt;/p&gt;


&lt;p&gt;Version : 7.0.33-0&amp;#43;deb9u13 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21707&#34;&gt;CVE-2021-21707&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31625&#34;&gt;CVE-2022-31625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31626&#34;&gt;CVE-2022-31626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31628&#34;&gt;CVE-2022-31628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31629&#34;&gt;CVE-2022-31629&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in PHP, a widely-used open
source general purpose scripting language which could result in denial
of service, information disclosure, insecure cookie handling or
potentially the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-774-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-774-1-linux-5.10/</link>
      <pubDate>Mon, 23 Jan 2023 09:52:16 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-774-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-774-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.158-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3759&#34;&gt;CVE-2021-3759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3169&#34;&gt;CVE-2022-3169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3435&#34;&gt;CVE-2022-3435&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3521&#34;&gt;CVE-2022-3521&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3524&#34;&gt;CVE-2022-3524&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3564&#34;&gt;CVE-2022-3564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3565&#34;&gt;CVE-2022-3565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3594&#34;&gt;CVE-2022-3594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3628&#34;&gt;CVE-2022-3628&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3640&#34;&gt;CVE-2022-3640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3643&#34;&gt;CVE-2022-3643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4139&#34;&gt;CVE-2022-4139&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4378&#34;&gt;CVE-2022-4378&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41849&#34;&gt;CVE-2022-41849&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41850&#34;&gt;CVE-2022-41850&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42328&#34;&gt;CVE-2022-42328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42329&#34;&gt;CVE-2022-42329&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42895&#34;&gt;CVE-2022-42895&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42896&#34;&gt;CVE-2022-42896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47518&#34;&gt;CVE-2022-47518&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47519&#34;&gt;CVE-2022-47519&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47520&#34;&gt;CVE-2022-47520&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47521&#34;&gt;CVE-2022-47521&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-3759&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the memory cgroup controller did not
account for kernel memory allocated for IPC objects.  A local user
could use this for denial of service (memory exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the NVMe host driver did not prevent a
concurrent reset and subsystem reset.  A local user with access to
an NVMe device could use this to cause a denial of service (device
disconnect or crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3435&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gwangun Jung reported a flaw in the IPv4 forwarding subsystem
which would lead to an out-of-bounds read.  A local user with
CAP_NET_ADMIN capability in any user namespace could possibly
exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3521&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the KCM subsystem
which could lead to a crash.

This subsystem is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3524&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the IPv6 stack which
could lead to a memory leak.  A local user could exploit this to
cause a denial of service (memory exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3564&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the Bluetooh L2CAP subsystem which
would lead to a use-after-free.  This might be exploitable
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3565&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the mISDN driver which would lead to a
use-after-free.  This might be exploitable to cause a denial of
service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andrew Gaul reported that the r8152 Ethernet driver would log
excessive numbers of messages in response to network errors.  A
remote attacker could possibly exploit this to cause a denial of
service (resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3628&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dokyung Song, Jisoo Jang, and Minsuk Kang reported a potential
heap-based buffer overflow in the brcmfmac Wi-Fi driver.  A user
able to connect a malicious USB device could exploit this to cause
a denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the Bluetooh L2CAP subsystem which
would lead to a use-after-free.  This might be exploitable
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3643 (XSA-423)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the Xen network backend driver that would
result in it generating malformed packet buffers.  If these
packets were forwarded to certain other network devices, a Xen
guest could exploit this to cause a denial of service (crash or
device reset).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4139&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the i915 graphics driver.  On gen12 &amp;quot;Xe&amp;quot;
GPUs it failed to flush TLBs when necessary, resulting in GPU
programs retaining access to freed memory.  A local user with
access to the GPU could exploit this to leak sensitive
information, cause a denial of service (crash or memory
corruption) or likely for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-4378&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng found a flaw in procfs that would cause a stack-based
buffer overflow.  A local user permitted to write to a sysctl
could use this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41849&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the smscufx graphics driver,
which could lead to a use-after-free.  A user able to remove the
physical device while also accessing its device node could exploit
this to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41850&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the hid-roccat input driver,
which could lead to a use-after-free.  A local user able to access
such a device could exploit this to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42328, CVE-2022-42329 (XSA-424)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yang Yingliang reported that the Xen network backend driver did
not use the proper function to free packet buffers in one case,
which could lead to a deadlock.  A Xen guest could exploit this to
cause a denial of service (hang).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42895&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tamás Koczka reported a flaw in the Bluetooh L2CAP subsystem
that would result in reading uninitialised memory.  A nearby
attacker able to make a Bluetooth connection could exploit
this to leak sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-42896&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tamás Koczka reported flaws in the Bluetooh L2CAP subsystem that
can lead to a use-after-free.  A nearby attacker able to make a
Bluetooth SMP connection could exploit this to cause a denial of
service (crash or memory corruption) or possibly for remote code
execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47518, CVE-2022-47519, CVE-2022-47521&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Several flaws were discovered in the wilc1000 Wi-Fi driver which
could lead to a heap-based buffer overflow.  A nearby attacker
could exploit these for denial of service (crash or memory
corruption) or possibly for remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-47520&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the wilc1000 Wi-Fi driver which could
lead to a heap-based buffer overflow.  A local user with
CAP_NET_ADMIN capability over such a Wi-Fi device could exploit
this for denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-773-1 pjproject security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-773-1-pjproject/</link>
      <pubDate>Wed, 18 Jan 2023 17:11:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-773-1-pjproject/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-773-1-pjproject/">
      
&lt;p&gt;Package : pjproject&lt;/p&gt;


&lt;p&gt;Version : 2.5.5~dfsg-6&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23537&#34;&gt;CVE-2022-23537&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23547&#34;&gt;CVE-2022-23547&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in pjproject, a free and open
source multimedia communication library written in C implementing
standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE&lt;/p&gt;
&lt;p&gt;CVE-2022-23537&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overread when parsing a specially crafted STUN message with
unknown attribute. The vulnerability affects applications that
uses STUN including PJNATH and PJSUA-LIB.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23547&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Possible buffer overread when parsing a certain STUN message.
The vulnerability affects applications that uses STUN including
PJNATH and PJSUA-LIB.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-772-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-772-1-sudo/</link>
      <pubDate>Wed, 18 Jan 2023 16:33:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-772-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-772-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.10p3-1&amp;#43;deb8u9 (jessie), 1.8.19p1-2.1&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22809&#34;&gt;CVE-2023-22809&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Matthieu Barjole and Victor Cutillas discovered that sudoedit in sudo, a
program designed to provide limited super user privileges to specific
users, does not properly handle &amp;lsquo;&amp;ndash;&amp;rsquo; to separate the editor and
arguments from files to edit. A local user permitted to edit certain
files can take advantage of this flaw to edit a file not permitted by
the security policy, resulting in privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-771-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-771-1-libxstream-java/</link>
      <pubDate>Mon, 16 Jan 2023 22:20:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-771-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-771-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u6 (jessie), 1.4.11.1-1&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41966&#34;&gt;CVE-2022-41966&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;XStream serializes Java objects to XML and back again. Versions prior to
this update may allow a remote attacker to terminate the application with a
stack overflow error, resulting in a denial of service only via manipulation of
the processed input stream. The attack uses the hash code implementation for
collections and maps to force recursive hash calculation causing a stack
overflow. This update handles the stack overflow and raises an
InputManipulationException instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-770-1 netty security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-770-1-netty/</link>
      <pubDate>Mon, 16 Jan 2023 00:10:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-770-1-netty/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-770-1-netty/">
      
&lt;p&gt;Package : netty&lt;/p&gt;


&lt;p&gt;Version : 1:4.1.7-2&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37136&#34;&gt;CVE-2021-37136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37137&#34;&gt;CVE-2021-37137&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43797&#34;&gt;CVE-2021-43797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41915&#34;&gt;CVE-2022-41915&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several out-of-memory, stack overflow or HTTP request smuggling vulnerabilities
have been discovered in Netty, a Java NIO client/server socket framework, which
may allow attackers to cause a denial of service or bypass restrictions when
used as a proxy.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-769-1 libapreq2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-769-1-libapreq2/</link>
      <pubDate>Sat, 14 Jan 2023 19:46:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-769-1-libapreq2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-769-1-libapreq2/">
      
&lt;p&gt;Package : libapreq2&lt;/p&gt;


&lt;p&gt;Version : 2.13-7~deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22728&#34;&gt;CVE-2022-22728&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw in Apache libapreq2 versions 2.16 and earlier could cause a
buffer overflow while processing multipart form uploads. A remote
attacker could send a request causing a process crash which could lead
to a denial of service attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-768-1 viewvc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-768-1-viewvc/</link>
      <pubDate>Wed, 11 Jan 2023 10:19:31 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-768-1-viewvc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-768-1-viewvc/">
      
&lt;p&gt;Package : viewvc&lt;/p&gt;


&lt;p&gt;Version : 1.1.26-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22456&#34;&gt;CVE-2023-22456&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2023-22464&#34;&gt;CVE-2023-22464&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two issues in &lt;em&gt;viewvc&lt;/em&gt;, a web-based interface
for browsing Subversion and CVS repositories. The attack vectors involved files
with unsafe names; names that, when embedded into an HTML stream, could cause
the browser to run unwanted code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-767-1 exiv2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-767-1-exiv2/</link>
      <pubDate>Wed, 11 Jan 2023 10:35:15 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-767-1-exiv2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-767-1-exiv2/">
      
&lt;p&gt;Package : exiv2&lt;/p&gt;


&lt;p&gt;Version : 0.24-4.1&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9239&#34;&gt;CVE-2017-9239&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11591&#34;&gt;CVE-2017-11591&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14859&#34;&gt;CVE-2017-14859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14862&#34;&gt;CVE-2017-14862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14864&#34;&gt;CVE-2017-14864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17669&#34;&gt;CVE-2017-17669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18005&#34;&gt;CVE-2017-18005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13110&#34;&gt;CVE-2019-13110&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13112&#34;&gt;CVE-2019-13112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-18771&#34;&gt;CVE-2020-18771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29458&#34;&gt;CVE-2021-29458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32815&#34;&gt;CVE-2021-32815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-34334&#34;&gt;CVE-2021-34334&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37620&#34;&gt;CVE-2021-37620&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37622&#34;&gt;CVE-2021-37622&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes a number of memory access violations and other input
validation failures that can be triggered by passing specially crafted files to
exiv2.&lt;/p&gt;
&lt;p&gt;CVE-2017-11591&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a Floating point exception in the Exiv2::ValueType function
in Exiv2 0.26 that will lead to a remote denial of service attack via
crafted input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14859&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Invalid memory address dereference was discovered in
Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The
vulnerability causes a segmentation fault and application crash, which
leads to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14862&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Invalid memory address dereference was discovered in
Exiv2::DataValue::read in value.cpp in Exiv2 0.26. The vulnerability
causes a segmentation fault and application crash, which leads to
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14864&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Invalid memory address dereference was discovered in
Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a
segmentation fault and application crash, which leads to denial of
service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-17669&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a heap-based buffer over-read in the
Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in
Exiv2 0.26. A crafted PNG file will lead to a remote denial of service
attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18005&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 0.26 has a Null Pointer Dereference in the
Exiv2::DataValue::toLong function in value.cpp, related to crafted
metadata in a TIFF file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-9239&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exiv2 0.26. When the data structure of the
structure ifd is incorrect, the program assigns pValue_ to 0x0, and
the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use
the value of pValue() to cause a segmentation fault. To exploit this
vulnerability, someone must open a crafted tiff file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13110&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A CiffDirectory::readDirectory integer overflow and out-of-bounds read
in Exiv2 through 0.27.1 allows an attacker to cause a denial of
service (SIGSEGV) via a crafted CRW image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13112&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2
through 0.27.1 allows an attacker to cause a denial of service (crash
due to an std::bad_alloc exception) via a crafted PNG image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-18771&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 0.27.99.0 has a global buffer over-read in
Exiv2::Internal::Nikon1MakerNote::print0x0088 in nikonmn_int.cpp which
can result in an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29458&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An out-of-bounds
read was found in Exiv2 versions v0.27.3 and earlier. The out-of-
bounds read is triggered when Exiv2 is used to write metadata into a
crafted image file. An attacker could potentially exploit the
vulnerability to cause a denial of service by crashing Exiv2, if they
can trick the victim into running Exiv2 on a crafted image file. Note
that this bug is only triggered when writing the metadata, which is a
less frequently used Exiv2 operation than reading the metadata. For
example, to trigger the bug in the Exiv2 command-line application, you
need to add an extra command-line argument such as insert. The bug is
fixed in version v0.27.4.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-32815&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. The assertion
failure is triggered when Exiv2 is used to modify the metadata of a
crafted image file. An attacker could potentially exploit the
vulnerability to cause a denial of service, if they can trick the
victim into running Exiv2 on a crafted image file. Note that this bug
is only triggered when modifying the metadata, which is a less
frequently used Exiv2 operation than reading the metadata. For
example, to trigger the bug in the Exiv2 command-line application, you
need to add an extra command-line argument such as `fi`. ### Patches
The bug is fixed in version v0.27.5. ### References Regression test
and bug fix: #1739 ### For more information Please see our [security
policy](https://github.com/Exiv2/exiv2/security/policy) for
information about Exiv2 security.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-34334&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An infinite loop
is triggered when Exiv2 is used to read the metadata of a crafted
image file. An attacker could potentially exploit the vulnerability to
cause a denial of service, if they can trick the victim into running
Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37620&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An out-of-bounds
read was found in Exiv2 versions v0.27.4 and earlier. The out-of-
bounds read is triggered when Exiv2 is used to read the metadata of a
crafted image file. An attacker could potentially exploit the
vulnerability to cause a denial of service, if they can trick the
victim into running Exiv2 on a crafted image file. The bug is fixed in
version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37622&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An infinite loop
was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is
triggered when Exiv2 is used to modify the metadata of a crafted image
file. An attacker could potentially exploit the vulnerability to cause
a denial of service, if they can trick the victim into running Exiv2
on a crafted image file. Note that this bug is only triggered when
deleting the IPTC data, which is a less frequently used Exiv2
operation that requires an extra command line option (`-d I rm`). The
bug is fixed in version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-766-1 exiv2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-766-1-exiv2/</link>
      <pubDate>Wed, 11 Jan 2023 10:35:10 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-766-1-exiv2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-766-1-exiv2/">
      
&lt;p&gt;Package : exiv2&lt;/p&gt;


&lt;p&gt;Version : 0.25-3.1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11591&#34;&gt;CVE-2017-11591&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14859&#34;&gt;CVE-2017-14859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14862&#34;&gt;CVE-2017-14862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14864&#34;&gt;CVE-2017-14864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17669&#34;&gt;CVE-2017-17669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18005&#34;&gt;CVE-2017-18005&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8976&#34;&gt;CVE-2018-8976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17581&#34;&gt;CVE-2018-17581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19107&#34;&gt;CVE-2018-19107&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19108&#34;&gt;CVE-2018-19108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19535&#34;&gt;CVE-2018-19535&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20097&#34;&gt;CVE-2018-20097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13110&#34;&gt;CVE-2019-13110&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13112&#34;&gt;CVE-2019-13112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13114&#34;&gt;CVE-2019-13114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13504&#34;&gt;CVE-2019-13504&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14369&#34;&gt;CVE-2019-14369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14370&#34;&gt;CVE-2019-14370&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17402&#34;&gt;CVE-2019-17402&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-18771&#34;&gt;CVE-2020-18771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29458&#34;&gt;CVE-2021-29458&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32815&#34;&gt;CVE-2021-32815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-34334&#34;&gt;CVE-2021-34334&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37620&#34;&gt;CVE-2021-37620&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37621&#34;&gt;CVE-2021-37621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37622&#34;&gt;CVE-2021-37622&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes a number of memory access violations and other input
validation failures that can be triggered by passing specially crafted files to
exiv2.&lt;/p&gt;
&lt;p&gt;CVE-2017-11591&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a Floating point exception in the Exiv2::ValueType function
in Exiv2 0.26 that will lead to a remote denial of service attack via
crafted input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14859&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Invalid memory address dereference was discovered in
Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The
vulnerability causes a segmentation fault and application crash, which
leads to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14862&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Invalid memory address dereference was discovered in
Exiv2::DataValue::read in value.cpp in Exiv2 0.26. The vulnerability
causes a segmentation fault and application crash, which leads to
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14864&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Invalid memory address dereference was discovered in
Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a
segmentation fault and application crash, which leads to denial of
service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-17669&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a heap-based buffer over-read in the
Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in
Exiv2 0.26. A crafted PNG file will lead to a remote denial of service
attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18005&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 0.26 has a Null Pointer Dereference in the
Exiv2::DataValue::toLong function in value.cpp, related to crafted
metadata in a TIFF file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-17581&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has
excessive stack consumption due to a recursive function, leading to
Denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19107&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from
psdimage.cpp in the PSD image reader) may suffer from a denial of
service (heap-based buffer over-read) caused by an integer overflow
via a crafted PSD image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19108&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the
PSD image reader may suffer from a denial of service (infinite loop)
caused by an integer overflow via a crafted PSD image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19535&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in
pngchunk_int.cpp may cause a denial of service (application crash due
to a heap-based buffer over-read) via a crafted PNG file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-20097&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a SEGV in
Exiv2::Internal::TiffParserWorker::findPrimaryGroups of
tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a
remote denial of service attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-8976&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial
of service (image.cpp Exiv2::Internal::stringFormat out-of-bounds
read) via a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13110&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A CiffDirectory::readDirectory integer overflow and out-of-bounds read
in Exiv2 through 0.27.1 allows an attacker to cause a denial of
service (SIGSEGV) via a crafted CRW image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13112&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2
through 0.27.1 allows an attacker to cause a denial of service (crash
due to an std::bad_alloc exception) via a crafted PNG image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13114&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;http.c in Exiv2 through 0.27.1 allows a malicious http server to cause
a denial of service (crash due to a NULL pointer dereference) by
returning a crafted response that lacks a space character.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13504&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in
mrwimage.cpp in Exiv2 through 0.27.2.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14369&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0
allows attackers to cause a denial of service (heap-based buffer over-
read) via a crafted image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14370&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Exiv2 0.27.99.0, there is an out-of-bounds read in
Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17402&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in
types.cpp when called from
Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp,
because there is no validation of the relationship of the total size
to the offset and size.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-18771&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 0.27.99.0 has a global buffer over-read in
Exiv2::Internal::Nikon1MakerNote::print0x0088 in nikonmn_int.cpp which
can result in an information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29458&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An out-of-bounds
read was found in Exiv2 versions v0.27.3 and earlier. The out-of-
bounds read is triggered when Exiv2 is used to write metadata into a
crafted image file. An attacker could potentially exploit the
vulnerability to cause a denial of service by crashing Exiv2, if they
can trick the victim into running Exiv2 on a crafted image file. Note
that this bug is only triggered when writing the metadata, which is a
less frequently used Exiv2 operation than reading the metadata. For
example, to trigger the bug in the Exiv2 command-line application, you
need to add an extra command-line argument such as insert. The bug is
fixed in version v0.27.4.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-32815&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. The assertion
failure is triggered when Exiv2 is used to modify the metadata of a
crafted image file. An attacker could potentially exploit the
vulnerability to cause a denial of service, if they can trick the
victim into running Exiv2 on a crafted image file. Note that this bug
is only triggered when modifying the metadata, which is a less
frequently used Exiv2 operation than reading the metadata. For
example, to trigger the bug in the Exiv2 command-line application, you
need to add an extra command-line argument such as `fi`. ### Patches
The bug is fixed in version v0.27.5. ### References Regression test
and bug fix: #1739 ### For more information Please see our [security
policy](https://github.com/Exiv2/exiv2/security/policy) for
information about Exiv2 security.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-34334&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An infinite loop
is triggered when Exiv2 is used to read the metadata of a crafted
image file. An attacker could potentially exploit the vulnerability to
cause a denial of service, if they can trick the victim into running
Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37620&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An out-of-bounds
read was found in Exiv2 versions v0.27.4 and earlier. The out-of-
bounds read is triggered when Exiv2 is used to read the metadata of a
crafted image file. An attacker could potentially exploit the
vulnerability to cause a denial of service, if they can trick the
victim into running Exiv2 on a crafted image file. The bug is fixed in
version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37621&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An infinite loop
was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is
triggered when Exiv2 is used to print the metadata of a crafted image
file. An attacker could potentially exploit the vulnerability to cause
a denial of service, if they can trick the victim into running Exiv2
on a crafted image file. Note that this bug is only triggered when
printing the image ICC profile, which is a less frequently used Exiv2
operation that requires an extra command line option (`-p C`). The bug
is fixed in version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37622&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Exiv2 is a command-line utility and C++ library for reading, writing,
deleting, and modifying the metadata of image files. An infinite loop
was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is
triggered when Exiv2 is used to modify the metadata of a crafted image
file. An attacker could potentially exploit the vulnerability to cause
a denial of service, if they can trick the victim into running Exiv2
on a crafted image file. Note that this bug is only triggered when
deleting the IPTC data, which is a less frequently used Exiv2
operation that requires an extra command line option (`-d I rm`). The
bug is fixed in version v0.27.5.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-765-1 leptonlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-765-1-leptonlib/</link>
      <pubDate>Tue, 10 Jan 2023 15:05:24 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-765-1-leptonlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-765-1-leptonlib/">
      
&lt;p&gt;Package : leptonlib&lt;/p&gt;


&lt;p&gt;Version : 1.71-2.1&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3836&#34;&gt;CVE-2018-3836&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7186&#34;&gt;CVE-2018-7186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7441&#34;&gt;CVE-2018-7441&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7442&#34;&gt;CVE-2018-7442&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38266&#34;&gt;CVE-2022-38266&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes several issues related to unsafe processing of untrusted
input and dealing with predictable paths below /tmp. Part of the affected
functionality is primarily intended for debugging leptonlib. This functionality
has been disabled rather than fixed. It can reenabled by issuing a call to
setLeptDebugOK(1). This change in behaviour was performed upstream and in
Debian 10 and later.&lt;/p&gt;
&lt;p&gt;CVE-2018-3836&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An exploitable command injection vulnerability exists in the
gplotMakeOutput function. A specially crafted gplot rootname argument can
cause a command injection resulting in arbitrary code execution. An
attacker can provide a malicious path as input to an application that
passes attacker data to this function to trigger this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7186&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Leptonica does not limit the number of characters in a %s format argument
to fscanf or sscanf, which allows remote attackers to cause a denial of
service (stack-based buffer overflow) or possibly have unspecified other
impact via a long string, as demonstrated by the gplotRead and
ptaReadStream functions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7441&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Leptonica uses hardcoded /tmp pathnames, which might allow local users to
overwrite arbitrary files or have unspecified other impact by creating
files in advance or winning a race condition, as demonstrated by
/tmp/junk_split_image.ps in prog/splitimage2pdf.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7442&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The gplotMakeOutput function does not block &#39;/&#39; characters in the gplot
rootname argument, potentially leading to path traversal and arbitrary file
overwrite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38266&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue in the Leptonica linked library allows attackers to cause an
arithmetic exception leading to a Denial of Service (DoS) via a crafted
JPEG file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-764-1 leptonlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-764-1-leptonlib/</link>
      <pubDate>Tue, 10 Jan 2023 15:03:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-764-1-leptonlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-764-1-leptonlib/">
      
&lt;p&gt;Package : leptonlib&lt;/p&gt;


&lt;p&gt;Version : 1.74.1-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18196&#34;&gt;CVE-2017-18196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3836&#34;&gt;CVE-2018-3836&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7186&#34;&gt;CVE-2018-7186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7441&#34;&gt;CVE-2018-7441&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7442&#34;&gt;CVE-2018-7442&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38266&#34;&gt;CVE-2022-38266&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes several issues related to unsafe processing of untrusted
input and dealing with predictable paths below /tmp. Part of the affected
functionality is primarily intended for debugging leptonlib. This functionality
has been disabled rather than fixed. It can reenabled by issuing a call to
setLeptDebugOK(1). This change in behaviour was performed upstream and in
Debian 10 and later.&lt;/p&gt;
&lt;p&gt;CVE-2017-18196&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Leptonica constructs unintended pathnames (containing duplicated path
components) when operating on files in /tmp subdirectories, which might
allow local users to bypass intended file restrictions by leveraging access
to a directory located deeper within the /tmp directory tree, as
demonstrated by /tmp/ANY/PATH/ANY/PATH/input.tif.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-3836&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An exploitable command injection vulnerability exists in the
gplotMakeOutput function. A specially crafted gplot rootname argument can
cause a command injection resulting in arbitrary code execution. An
attacker can provide a malicious path as input to an application that
passes attacker data to this function to trigger this vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7186&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Leptonica does not limit the number of characters in a %s format argument
to fscanf or sscanf, which allows remote attackers to cause a denial of
service (stack-based buffer overflow) or possibly have unspecified other
impact via a long string, as demonstrated by the gplotRead and
ptaReadStream functions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7441&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Leptonica uses hardcoded /tmp pathnames, which might allow local users to
overwrite arbitrary files or have unspecified other impact by creating
files in advance or winning a race condition, as demonstrated by
/tmp/junk_split_image.ps in prog/splitimage2pdf.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7442&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The gplotMakeOutput function does not block &#39;/&#39; characters in the gplot
rootname argument, potentially leading to path traversal and arbitrary file
overwrite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38266&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue in the Leptonica linked library allows attackers to cause an
arithmetic exception leading to a Denial of Service (DoS) via a crafted
JPEG file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-763-1 grub2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-763-1-grub2/</link>
      <pubDate>Mon, 09 Jan 2023 01:11:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-763-1-grub2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-763-1-grub2/">
      
&lt;p&gt;Package : grub2&lt;/p&gt;


&lt;p&gt;Version : 2.02~beta2-22&amp;#43;deb8u2 (jessie)&lt;/p&gt;


      &lt;p&gt;Several issues were found in GRUB2&amp;rsquo;s font handling code, which could result in
crashes and potentially execution of arbitrary code. Further issues were found
in image loading that could potentially lead to memory overflows. Please note
that some integer overflow mitigations could not be applied because of builtin
GCC functions which are only available in newer Debian versions. Only system
administrators should be able to change grub2 fonts. If you use the default
fonts, your system is not affected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-762-1 libjettison-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-762-1-libjettison-java/</link>
      <pubDate>Sat, 31 Dec 2022 18:29:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-762-1-libjettison-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-762-1-libjettison-java/">
      
&lt;p&gt;Package : libjettison-java&lt;/p&gt;


&lt;p&gt;Version : 1.5.3-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40150&#34;&gt;CVE-2022-40150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45685&#34;&gt;CVE-2022-45685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-45693&#34;&gt;CVE-2022-45693&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several flaws have been discovered in libjettison-java, a
collection of StAX parsers and writers for JSON. Specially crafted user input
may cause a denial of service via out-of-memory or stack overflow errors.&lt;/p&gt;
&lt;p&gt;In addition a build failure related to the update was fixed in jersey1.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-761-1 exuberant-ctags security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-761-1-exuberant-ctags/</link>
      <pubDate>Sat, 31 Dec 2022 13:03:14 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-761-1-exuberant-ctags/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-761-1-exuberant-ctags/">
      
&lt;p&gt;Package : exuberant-ctags&lt;/p&gt;


&lt;p&gt;Version : 1:5.9~svn20110310-11&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-4515&#34;&gt;CVE-2022-4515&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in the way the exubertant-ctags source code parser handled the
&amp;ldquo;-o&amp;rdquo; command-line option which specifies the tag filename. A crafted tag
filename specified in the command line or in the configuration file could have
resulted in arbitrary command execution because the externalSortTags() in
sort.c calls the system(3) function in an unsafe way.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-760-1 grub2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-760-1-grub2/</link>
      <pubDate>Fri, 30 Dec 2022 14:41:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-760-1-grub2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-760-1-grub2/">
      
&lt;p&gt;Package : grub2&lt;/p&gt;


&lt;p&gt;Version : 2.02~beta3-5&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2601&#34;&gt;CVE-2022-2601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3775&#34;&gt;CVE-2022-3775&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues were found in GRUB2&amp;rsquo;s font handling code, which could
result in crashes and potentially execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-759-1 libcommons-net-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-759-1-libcommons-net-java/</link>
      <pubDate>Thu, 29 Dec 2022 21:50:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-759-1-libcommons-net-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-759-1-libcommons-net-java/">
      
&lt;p&gt;Package : libcommons-net-java&lt;/p&gt;


&lt;p&gt;Version : 3.6-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37533&#34;&gt;CVE-2021-37533&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;ZeddYu Lu discovered that the FTP client of Apache Commons Net, a Java
client API for basic Internet protocols, trusts the host from PASV response
by default. A malicious server can redirect the Commons Net code to use a
different host, but the user has to connect to the malicious server in the
first place. This may lead to leakage of information about services running
on the private network of the client.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-758-1 exempi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-758-1-exempi/</link>
      <pubDate>Thu, 29 Dec 2022 08:25:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-758-1-exempi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-758-1-exempi/">
      
&lt;p&gt;Package : exempi&lt;/p&gt;


&lt;p&gt;Version : 2.4.1-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18233&#34;&gt;CVE-2017-18233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18234&#34;&gt;CVE-2017-18234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18235&#34;&gt;CVE-2017-18235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18236&#34;&gt;CVE-2017-18236&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18237&#34;&gt;CVE-2017-18237&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18238&#34;&gt;CVE-2017-18238&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7728&#34;&gt;CVE-2018-7728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7729&#34;&gt;CVE-2018-7729&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7730&#34;&gt;CVE-2018-7730&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7731&#34;&gt;CVE-2018-7731&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12648&#34;&gt;CVE-2018-12648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36045&#34;&gt;CVE-2021-36045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36046&#34;&gt;CVE-2021-36046&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36047&#34;&gt;CVE-2021-36047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36048&#34;&gt;CVE-2021-36048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36050&#34;&gt;CVE-2021-36050&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36051&#34;&gt;CVE-2021-36051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36052&#34;&gt;CVE-2021-36052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36053&#34;&gt;CVE-2021-36053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36054&#34;&gt;CVE-2021-36054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36055&#34;&gt;CVE-2021-36055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36056&#34;&gt;CVE-2021-36056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36057&#34;&gt;CVE-2021-36057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36058&#34;&gt;CVE-2021-36058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36064&#34;&gt;CVE-2021-36064&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39847&#34;&gt;CVE-2021-39847&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40716&#34;&gt;CVE-2021-40716&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40732&#34;&gt;CVE-2021-40732&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42528&#34;&gt;CVE-2021-42528&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42529&#34;&gt;CVE-2021-42529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42530&#34;&gt;CVE-2021-42530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42531&#34;&gt;CVE-2021-42531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42532&#34;&gt;CVE-2021-42532&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in exempi, a library to parse XMP (Extensible
Metadata Platform) metadata, which may result in denial of service (infinite
loops and crashes), memory disclosures, potentially arbitrary code executions in
the context of the current user or other unspecified impacts.&lt;/p&gt;
&lt;p&gt;CVE-2017-18233&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk
class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to
cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18234&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi before 2.4.3. It allows remote attackers to
cause a denial of service (invalid memcpy with resultant use-after-free) or
possibly have unspecified other impact via a .pdf file containing JPEG data,
related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp,
XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and
XMPFiles/source/FormatSupport/TIFF_Support.hpp
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18235&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi before 2.4.3. The VPXChunk class in
XMPFiles/source/FormatSupport/WEBP_Support.cpp does not ensure nonzero widths
and heights, which allows remote attackers to cause a denial of service
(assertion failure and application exit) via a crafted .webp file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18236&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi before 2.4.4. The
ASF_Support::ReadHeaderObject function in
XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause
a denial of service (infinite loop) via a crafted .asf file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18237&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi before 2.4.3. The
PostScript_Support::ConvertToDate function in
XMPFiles/source/FormatSupport/PostScript_Support.cpp allows remote attackers to
cause a denial of service (invalid pointer dereference and application crash)
via a crafted .ps file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-18238&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi before 2.4.4. The
TradQT_Manager::ParseCachedBoxes function in
XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to
cause a denial of service (infinite loop) via crafted XMP data in a .qt file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7728&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi through 2.4.4.
XMPFiles/source/FileHandlers/TIFF_Handler.cpp mishandles a case of a zero
length, leading to a heap-based buffer over-read in the MD5Update() function in
third-party/zuid/interfaces/MD5.cpp.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7729&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi through 2.4.4. There is a stack-based buffer
over-read in the PostScript_MetaHandler::ParsePSFile() function in
XMPFiles/source/FileHandlers/PostScript_Handler.cpp.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7730&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff
length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp,
leading to a heap-based buffer over-read in the
PSD_MetaHandler::CacheFileData() function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7731&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Exempi through 2.4.4.
XMPFiles/source/FormatSupport/WEBP_Support.cpp does not check whether a
bitstream has a NULL value, leading to a NULL pointer dereference in the
WEBP::VP8XChunk class.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-12648&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The WEBP::GetLE32 function in XMPFiles/source/FormatSupport/WEBP_Support.hpp in
Exempi 2.4.5 has a NULL pointer dereference.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36045&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds
read vulnerability that could lead to disclosure of arbitrary memory. An
attacker could leverage this vulnerability to bypass mitigations such as ASLR.
Exploitation of this issue requires user interaction in that a victim must open
a malicious file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36046 / CVE-2021-36052&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit version 2020.1 (and earlier) is affected by a memory corruption
vulnerability, potentially resulting in arbitrary code execution in the context
of the current user. User interaction is required to exploit this
vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36047 / CVE-2021-36048&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input
Validation vulnerability potentially resulting in arbitrary code execution in
the context of the current user. Exploitation requires user interaction in that
a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36050 / CVE-2021-36051&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow
vulnerability potentially resulting in arbitrary code execution in the context
of the current user. Exploitation requires user interaction in that a victim
must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36053&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds
read vulnerability that could lead to disclosure of arbitrary memory. An
attacker could leverage this vulnerability to bypass mitigations such as ASLR.
Exploitation of this issue requires user interaction in that a victim must open
a malicious file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36054&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow
vulnerability potentially resulting in local application denial of service in
the context of the current user. Exploitation requires user interaction in that
a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36055 / CVE-2021-36056&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK versions 2020.1 (and earlier) are affected by a use-after-free
vulnerability that could result in arbitrary code execution in the context of
the current user. Exploitation of this issue requires user interaction in that
a victim must open a malicious file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36057&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2020.1 (and earlier) is affected by a write-what-where
condition vulnerability caused during the application&#39;s memory allocation
process. This may cause the memory management functions to become mismatched
resulting in local application denial of service in the context of the current
user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36058&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Integer Overflow
vulnerability potentially resulting in application-level denial of service in
the context of the current user. Exploitation requires user interaction in that
a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36064&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit version 2020.1 (and earlier) is affected by a Buffer Underflow
vulnerability which could result in arbitrary code execution in the context of
the current user. Exploitation of this issue requires user interaction in that
a victim must open a malicious file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-39847&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code execution
in the context of the current user. Exploitation requires user interaction in
that a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40716&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds
read vulnerability that could lead to disclosure of sensitive memory. An
attacker could leverage this vulnerability to bypass mitigations such as ASLR.
Exploitation of this issue requires user interaction in that a victim must open
a malicious file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40732&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer
dereference vulnerability that could result in leaking data from certain memory
locations and causing a local denial of service in the context of the current
user. User interaction is required to exploit this vulnerability in that the
victim will need to open a specially crafted MXF file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42528&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit 2021.07 (and earlier) is affected by a Null pointer dereference
vulnerability when parsing a specially crafted file. An unauthenticated
attacker could leverage this vulnerability to achieve an application
denial-of-service in the context of the current user. Exploitation of this
issue requires user interaction in that a victim must open a malicious file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42529&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code execution
in the context of the current user. Exploitation requires user interaction in
that a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42530&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code execution
in the context of the current user. Exploitation requires user interaction in
that a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42531&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code execution
in the context of the current user. Exploitation requires user interaction in
that a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42532&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code execution
in the context of the current user. Exploitation requires user interaction in
that a victim must open a crafted file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-757-1 proftpd-dfsg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-757-1-proftpd-dfsg/</link>
      <pubDate>Sun, 25 Dec 2022 23:50:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-757-1-proftpd-dfsg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-757-1-proftpd-dfsg/">
      
&lt;p&gt;Package : proftpd-dfsg&lt;/p&gt;


&lt;p&gt;Version : 1.3.5e&amp;#43;r1.3.5-2&amp;#43;deb8u8 (jessie), 1.3.5e&amp;#43;r1.3.5b-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46854&#34;&gt;CVE-2021-46854&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that mod_radius in ProFTPD, a versatile, virtual-hosting FTP
daemon, allows memory disclosure to RADIUS servers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-756-1 libksba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-756-1-libksba/</link>
      <pubDate>Sat, 24 Dec 2022 16:37:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-756-1-libksba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-756-1-libksba/">
      
&lt;p&gt;Package : libksba&lt;/p&gt;


&lt;p&gt;Version : 1.3.2-1&amp;#43;deb8u3 (jessie), 1.3.5-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-47629&#34;&gt;CVE-2022-47629&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow flaw was discovered in the CRL signature parser in
libksba, an X.509 and CMS support library, which could result in denial
of service or the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-755-1 libde265 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-755-1-libde265/</link>
      <pubDate>Fri, 16 Dec 2022 15:46:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-755-1-libde265/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-755-1-libde265/">
      
&lt;p&gt;Package : libde265&lt;/p&gt;


&lt;p&gt;Version : 1.0.2-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21599&#34;&gt;CVE-2020-21599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35452&#34;&gt;CVE-2021-35452&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36409&#34;&gt;CVE-2021-36409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36410&#34;&gt;CVE-2021-36410&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36411&#34;&gt;CVE-2021-36411&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in libde265, an open source implementation of the
h.265 video codec, which may result in denial of service, or have unspecified
other impact.&lt;/p&gt;
&lt;p&gt;CVE-2020-21599&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libde265 v1.0.4 contains a heap buffer overflow in the
de265_image::available_zscan function, which can be exploited via a crafted
a file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-35452&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to
a SEGV in slice.cc.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36409&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an Assertion `scaling_list_pred_matrix_id_delta==1&#39; failed at
sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to
cause a Denial of Service (DoS) by running the application with a crafted
file or possibly have unspecified other impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36410&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in
function put_epel_hv_fallback when running program dec265.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-36411&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue has been found in libde265 v1.0.8 due to incorrect access control.
A SEGV caused by a READ memory access in function derive_boundaryStrength of
deblock.cc has occurred. The vulnerability causes a segmentation fault and
application crash, which leads to remote denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-754-1 erlang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-754-1-erlang/</link>
      <pubDate>Mon, 12 Dec 2022 15:17:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-754-1-erlang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-754-1-erlang/">
      
&lt;p&gt;Package : erlang&lt;/p&gt;


&lt;p&gt;Version : 1:19.2.1&amp;#43;dfsg-2&amp;#43;really23.3.4.18-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37026&#34;&gt;CVE-2022-37026&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A Client Authentication Bypass vulnerability has been discovered in the
concurrent, real-time, distributed functional language Erlang. Impacted are
those who are running an ssl/tls/dtls server using the ssl application either
directly or indirectly via other applications. Note that the vulnerability
only affects servers that request client certification, that is sets the option
{verify, verify_peer}.&lt;/p&gt;
&lt;p&gt;The rabbitmq-server binary package is most affected by this vulnerability. In
order to remedy the problem rabbitmq-server was upgraded to version
3.6.6+really3.8.9-0+deb9u1.&lt;/p&gt;
&lt;p&gt;Please note that the versioning scheme +really{$upstream_version} indicates the
real upstream version. This was done to allow seamless upgrades from Stretch to
Buster.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-753-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-753-1-krb5/</link>
      <pubDate>Thu, 08 Dec 2022 14:49:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-753-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-753-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-19&amp;#43;deb8u7 (jessie), 1.15-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42898&#34;&gt;CVE-2022-42898&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential Denial of Service (DoS)
attack against krb5, a suite of tools implementing the Kerberos
authentication system. An integer overflow in PAC parsing could have
been exploited if a cross-realm entity acted maliciously.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-752-1 jqueryui security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-752-1-jqueryui/</link>
      <pubDate>Wed, 07 Dec 2022 16:02:47 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-752-1-jqueryui/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-752-1-jqueryui/">
      
&lt;p&gt;Package : jqueryui&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-4&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41182&#34;&gt;CVE-2021-41182&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41183&#34;&gt;CVE-2021-41183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41184&#34;&gt;CVE-2021-41184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31160&#34;&gt;CVE-2022-31160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;jQuery-UI, the official jQuery user interface library, is a curated set
of user interface interactions, effects, widgets, and themes built on top
of jQuery were reported to have the following vulnerabilities.&lt;/p&gt;
&lt;p&gt;CVE-2021-41182&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;jQuery-UI was accepting the value of the `altField` option of the
Datepicker widget from untrusted sources may execute untrusted code.
This has been fixed and now any string value passed to the `altField`
option is now treated as a CSS selector.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41183&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;jQuery-UI was accepting the value of various `*Text` options of the
Datepicker widget from untrusted sources may execute untrusted code.
This has been fixed and now the values passed to various `*Text`
options are now always treated as pure text, not HTML.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41184&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;jQuery-UI was accepting the value of the `of` option of the
`.position()` util from untrusted sources may execute untrusted code.
This has been fixed and now any string value passed to the `of`
option is now treated as a CSS selector.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31160&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;jQuery-UI was potentially vulnerable to cross-site scripting.
Initializing a checkboxradio widget on an input enclosed within a
label makes that parent label contents considered as the input label.
Calling `.checkboxradio( &amp;quot;refresh&amp;quot; )` on such a widget and the initial
HTML contained encoded HTML entities will make them erroneously get
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-751-1 giflib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-751-1-giflib/</link>
      <pubDate>Mon, 05 Dec 2022 13:36:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-751-1-giflib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-751-1-giflib/">
      
&lt;p&gt;Package : giflib&lt;/p&gt;


&lt;p&gt;Version : 4.1.6-11&amp;#43;deb8u2 (jessie), 5.1.4-0.4&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-3977&#34;&gt;CVE-2016-3977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11490&#34;&gt;CVE-2018-11490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15133&#34;&gt;CVE-2019-15133&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes two file format vulnerabilities in giflib and one in the
gif2rgb utility.&lt;/p&gt;
&lt;p&gt;CVE-2016-3977&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based buffer overflow in util/gif2rgb.c in gif2rgb allows
remote attackers to cause a denial of service (application crash)
via the background color index in a GIF file
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-11490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The DGifDecompressLine function in dgif_lib.c, as later shipped in
cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a
certain &amp;quot;Private-&amp;gt;RunningCode - 2&amp;quot; array index is not checked.  This
will lead to a denial of service or possibly unspecified other
impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15133&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A malformed GIF file triggers a divide-by-zero exception in the
decoder function DGifSlurp in dgif_lib.c if the height field of the
ImageSize data structure is equal to zero.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-750-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-750-1-clamav/</link>
      <pubDate>Mon, 05 Dec 2022 17:08:16 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-750-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-750-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.103.7&amp;#43;dfsg-0&amp;#43;deb8u1 (jessie), 0.103.7&amp;#43;dfsg-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;ClamAV, an anti-virus utility for Unix, v0.103.7 is a critical patch
release with the following fixes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fix logical signature &amp;ldquo;Intermediates&amp;rdquo; feature.&lt;/li&gt;
&lt;li&gt;Relax constraints on slightly malformed zip archives that contain
overlapping file entries.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-749-1 vlc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-749-1-vlc/</link>
      <pubDate>Sat, 03 Dec 2022 04:52:16 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-749-1-vlc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-749-1-vlc/">
      
&lt;p&gt;Package : vlc&lt;/p&gt;


&lt;p&gt;Version : 3.0.17.4-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41325&#34;&gt;CVE-2022-41325&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Mitsurugi Heishiro found out that in VLC, multimedia player and streamer,
a potential buffer overflow in the vnc module could trigger remote code
execution if a malicious vnc URL is deliberately played.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-748-1 libraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-748-1-libraw/</link>
      <pubDate>Thu, 01 Dec 2022 18:03:52 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-748-1-libraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-748-1-libraw/">
      
&lt;p&gt;Package : libraw&lt;/p&gt;


&lt;p&gt;Version : 0.16.0-9&amp;#43;deb8u6 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15503&#34;&gt;CVE-2020-15503&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update adds thumbnail size checks to avoid out of bounds memory accesses.&lt;/p&gt;
&lt;p&gt;CVE-2020-15503&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LibRaw lacks a thumbnail size range check. This affects
decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and
utils/thumb_utils.cpp. For example,
malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without
validating T.tlength.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-747-1 libraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-747-1-libraw/</link>
      <pubDate>Thu, 01 Dec 2022 18:02:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-747-1-libraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-747-1-libraw/">
      
&lt;p&gt;Package : libraw&lt;/p&gt;


&lt;p&gt;Version : 0.17.2-6&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16909&#34;&gt;CVE-2017-16909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15503&#34;&gt;CVE-2020-15503&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes two more memory access violations. CVE-2017-16909 was
reported as fixed via DLA-2903-1 earlier, but that update really fixed
CVE-2017-16910.&lt;/p&gt;
&lt;p&gt;CVE-2017-16909&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An error related to the &amp;quot;LibRaw::panasonic_load_raw()&amp;quot; function
(dcraw_common.cpp) can be exploited to cause a heap-based buffer
overflow and subsequently cause a crash via a specially crafted
TIFF image.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-15503&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LibRaw lacks a thumbnail size range check. This affects
decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and
utils/thumb_utils.cpp. For example,
malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without
validating T.tlength.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-746-1 inetutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-746-1-inetutils/</link>
      <pubDate>Wed, 30 Nov 2022 23:33:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-746-1-inetutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-746-1-inetutils/">
      
&lt;p&gt;Package : inetutils&lt;/p&gt;


&lt;p&gt;Version : 2:1.9.4-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40491&#34;&gt;CVE-2021-40491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39028&#34;&gt;CVE-2022-39028&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were discovered in inetutils, a
collection of common network programs.&lt;/p&gt;
&lt;p&gt;CVE-2021-40491&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;inetutils&#39; ftp client before 2.2 does not validate addresses
returned by PSV/LSPV responses to make sure they match the server
address.  A malicious server can exploit this flaw to reach services
in the client&#39;s private network.  (This is similar to curl&#39;s
CVE-2020-8284.)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39028&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;inetutils&#39;s telnet server through 2.3 has a NULL pointer dereference
which a client can trigger by sending 0xff 0xf7 or 0xff 0xf8.  In a
typical installation, the telnetd application would crash but the
telnet service would remain available through inetd.  However, if the
telnetd application has many crashes within a short time interval,
the telnet service would become unavailable after inetd logs a
&amp;quot;telnet/tcp server failing (looping), service terminated&amp;quot; error.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-745-1 snapd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-745-1-snapd/</link>
      <pubDate>Wed, 30 Nov 2022 23:29:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-745-1-snapd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-745-1-snapd/">
      
&lt;p&gt;Package : snapd&lt;/p&gt;


&lt;p&gt;Version : 2.21-2&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44730&#34;&gt;CVE-2021-44730&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44731&#34;&gt;CVE-2021-44731&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilties were discovered in snapd, a daemon and tooling that enable Snap packages,
which could result in bypass of access restrictions or privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-743-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-743-1-squid3/</link>
      <pubDate>Tue, 29 Nov 2022 15:06:12 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-743-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-743-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u6 (jessie), 3.5.23-5&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41317&#34;&gt;CVE-2022-41317&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41318&#34;&gt;CVE-2022-41318&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes two vulnerabilities in squid3&lt;/p&gt;
&lt;p&gt;CVE-2022-41317&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to inconsistent handling of internal URIs Squid is
vulnerable to Exposure of Sensitive Information about clients
using the proxy.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41318&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to an incorrect integer overflow protection Squid SSPI and
SMB authentication helpers are vulnerable to a Buffer Overflow
attack.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-744-1 libraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-744-1-libraw/</link>
      <pubDate>Tue, 29 Nov 2022 10:18:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-744-1-libraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-744-1-libraw/">
      
&lt;p&gt;Package : libraw&lt;/p&gt;


&lt;p&gt;Version : 0.16.0-9&amp;#43;deb8u5 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13735&#34;&gt;CVE-2017-13735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14265&#34;&gt;CVE-2017-14265&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14608&#34;&gt;CVE-2017-14608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16909&#34;&gt;CVE-2017-16909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16910&#34;&gt;CVE-2017-16910&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5804&#34;&gt;CVE-2018-5804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5805&#34;&gt;CVE-2018-5805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5806&#34;&gt;CVE-2018-5806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5813&#34;&gt;CVE-2018-5813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10528&#34;&gt;CVE-2018-10528&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10529&#34;&gt;CVE-2018-10529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35530&#34;&gt;CVE-2020-35530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35531&#34;&gt;CVE-2020-35531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35532&#34;&gt;CVE-2020-35532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35533&#34;&gt;CVE-2020-35533&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes multiple memory access violations.&lt;/p&gt;
&lt;p&gt;CVE-2017-13735&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a floating point exception in the kodak_radc_load_raw
function in dcraw_common.cpp. It will lead to a remote denial of
service attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14265&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A Stack-based Buffer Overflow was discovered in xtrans_interpolate in
internal/dcraw_common.cpp. It could allow a remote denial of service
or code execution attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14608&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out of bounds read flaw related to kodak_65000_load_raw has been
reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker
could possibly exploit this flaw to disclose potentially sensitive
memory or cause an application crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-16909&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An error related to the &amp;quot;LibRaw::panasonic_load_raw()&amp;quot; function
(dcraw_common.cpp) can be exploited to cause a heap-based buffer
overflow and subsequently cause a crash via a specially crafted TIFF
image.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-16910&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An error within the &amp;quot;LibRaw::xtrans_interpolate()&amp;quot; function
(internal/dcraw_common.cpp) can be exploited to cause an invalid read
memory access and subsequently a Denial of Service condition.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10528&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a stack-based buffer overflow in the utf2char function in
libraw_cxx.cpp.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10529&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an out-of-bounds read affecting the X3F property table list
implementation in libraw_x3f.cpp and libraw_cxx.cpp.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5804&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A type confusion error within the &amp;quot;identify()&amp;quot; function
(internal/dcraw_common.cpp) can be exploited to trigger a division by
zero.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5805&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A boundary error within the &amp;quot;quicktake_100_load_raw()&amp;quot; function
(internal/dcraw_common.cpp) can be exploited to cause a stack-based
buffer overflow and subsequently cause a crash.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5806&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An error within the &amp;quot;leaf_hdr_load_raw()&amp;quot; function
(internal/dcraw_common.cpp) can be exploited to trigger a NULL pointer
dereference.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5813&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An error within the &amp;quot;parse_minolta()&amp;quot; function (dcraw/dcraw.c) can be
exploited to trigger an infinite loop via a specially crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35530&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an out-of-bounds write vulnerability within the &amp;quot;new_node()&amp;quot;
function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered
via a crafted X3F file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35531&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds read vulnerability exists within the get_huffman_diff()
function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from
an image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35532&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds read vulnerability exists within the
&amp;quot;simple_decode_row()&amp;quot; function (libraw\src\x3f\x3f_utils_patched.cpp)
which can be triggered via an image with a large row_stride field.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35533&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds read vulnerability exists within the
&amp;quot;LibRaw::adobe_copy_pixel()&amp;quot; function (libraw\src\decoders\dng.cpp)
when reading data from the image file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-737-2 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-737-2-postgresql-9.6/</link>
      <pubDate>Sun, 27 Nov 2022 08:27:49 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-737-2-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-737-2-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u3 (stretch)&lt;/p&gt;


      &lt;p&gt;The postgresql-9.6 packages announced in ELA-737-1 failed to build as a
result of a configuration setting in the build environment.  The
packages announced in this follow-up update have been modified so that
they will build properly.  The CVEs referenced in ELA-737-1 remain
properly patched in this release and this release contains no changes
outside of those necessary to address the build failure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-742-1 dhcpcd5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-742-1-dhcpcd5/</link>
      <pubDate>Fri, 25 Nov 2022 23:16:54 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-742-1-dhcpcd5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-742-1-dhcpcd5/">
      
&lt;p&gt;Package : dhcpcd5&lt;/p&gt;


&lt;p&gt;Version : 6.10.1-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11578&#34;&gt;CVE-2019-11578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11579&#34;&gt;CVE-2019-11579&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in dhcpcd5, a DHCPv4 and
DHCPv6 dual-stack client.&lt;/p&gt;
&lt;p&gt;CVE-2019-11579:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;dhcp.c in dhcpcd contains a 1-byte read overflow with DHO_OPTSOVERLOADED.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11578:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;auth.c in dhcpcd allowed attackers to infer secrets by performing latency attacks.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-740-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-740-1-vim/</link>
      <pubDate>Fri, 25 Nov 2022 08:00:52 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-740-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-740-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:8.0.0197-4&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1897&#34;&gt;CVE-2022-1897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1942&#34;&gt;CVE-2022-1942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2000&#34;&gt;CVE-2022-2000&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2129&#34;&gt;CVE-2022-2129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3235&#34;&gt;CVE-2022-3235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3256&#34;&gt;CVE-2022-3256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3352&#34;&gt;CVE-2022-3352&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes multiple memory access violations in vim.&lt;/p&gt;
&lt;p&gt;CVE-2022-1897&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1942&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based Buffer Overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2000&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2129&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3235&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use After Free
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3256&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use After Free
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3352&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use After Free
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-741-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-741-1-vim/</link>
      <pubDate>Fri, 25 Nov 2022 08:00:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-741-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-741-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u9 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1785&#34;&gt;CVE-2022-1785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1897&#34;&gt;CVE-2022-1897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1942&#34;&gt;CVE-2022-1942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2000&#34;&gt;CVE-2022-2000&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2129&#34;&gt;CVE-2022-2129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3235&#34;&gt;CVE-2022-3235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3256&#34;&gt;CVE-2022-3256&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes multiple memory access violations in vim.&lt;/p&gt;
&lt;p&gt;CVE-2022-1785&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1897&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1942&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based Buffer Overflow
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2000&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2129&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds Write
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3235&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use After Free
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3256&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use After Free
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-739-1 nginx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-739-1-nginx/</link>
      <pubDate>Wed, 23 Nov 2022 22:54:35 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-739-1-nginx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-739-1-nginx/">
      
&lt;p&gt;Package : nginx&lt;/p&gt;


&lt;p&gt;Version : 1.6.2-5&amp;#43;deb8u10 (jessie), 1.10.3-1&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3618&#34;&gt;CVE-2021-3618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41741&#34;&gt;CVE-2022-41741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41742&#34;&gt;CVE-2022-41742&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that parsing errors in the mp4 module of Nginx, a
high-performance web and reverse proxy server, could result in denial
of service, memory disclosure or potentially the execution of arbitrary
code when processing a malformed mp4 file.&lt;/p&gt;
&lt;p&gt;This module is only enabled in the nginx-extras binary package.&lt;/p&gt;
&lt;p&gt;In addition the following vulnerability has been fixed.&lt;/p&gt;
&lt;p&gt;CVE-2021-3618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ALPACA is an application layer protocol content confusion attack,
exploiting TLS servers implementing different protocols but using
compatible certificates, such as multi-domain or wildcard certificates.
A MiTM attacker having access to victim&#39;s traffic at the TCP/IP layer can
redirect traffic from one subdomain to another, resulting in a valid TLS
session. This breaks the authentication of TLS and cross-protocol attacks
may be possible where the behavior of one protocol service may compromise
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-738-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-738-1-postgresql-9.4/</link>
      <pubDate>Wed, 23 Nov 2022 15:38:53 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-738-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-738-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2625&#34;&gt;CVE-2022-2625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1552&#34;&gt;CVE-2022-1552&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-2625&lt;/p&gt;
&lt;p&gt;Sven Klemm found that some extensions in the PostgreSQL database
system could replace objects not belonging to the extension. An
attacker could leverage this to run arbitrary commands as another
user.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-1552&lt;/p&gt;
&lt;p&gt;Alexander Lakhin discovered that the autovacuum feature and multiple
commands could escape the &amp;ldquo;security-restricted operation&amp;rdquo; sandbox.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-737-1 postgresql-9.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-737-1-postgresql-9.6/</link>
      <pubDate>Wed, 23 Nov 2022 15:38:41 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-737-1-postgresql-9.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-737-1-postgresql-9.6/">
      
&lt;p&gt;Package : postgresql-9.6&lt;/p&gt;


&lt;p&gt;Version : 9.6.24-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2625&#34;&gt;CVE-2022-2625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1552&#34;&gt;CVE-2022-1552&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-2625&lt;/p&gt;
&lt;p&gt;Sven Klemm found that some extensions in the PostgreSQL database
system could replace objects not belonging to the extension. An
attacker could leverage this to run arbitrary commands as another
user.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-1552&lt;/p&gt;
&lt;p&gt;Alexander Lakhin discovered that the autovacuum feature and multiple
commands could escape the &amp;ldquo;security-restricted operation&amp;rdquo; sandbox.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-736-1 ntfs-3g security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-736-1-ntfs-3g/</link>
      <pubDate>Tue, 22 Nov 2022 00:16:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-736-1-ntfs-3g/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-736-1-ntfs-3g/">
      
&lt;p&gt;Package : ntfs-3g&lt;/p&gt;


&lt;p&gt;Version : 1:2014.2.15AR.2-1&amp;#43;deb8u7 (jessie), 1:2016.2.22AR.1&amp;#43;dfsg-1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40284&#34;&gt;CVE-2022-40284&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G,
a read-write NTFS driver for FUSE, due to incorrect validation of some
of the NTFS metadata. A local user can take advantage of this flaw for
local root privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-735-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-735-1-tomcat7/</link>
      <pubDate>Sun, 20 Nov 2022 23:59:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-735-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-735-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30640&#34;&gt;CVE-2021-30640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42252&#34;&gt;CVE-2022-42252&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2022-42252&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If Apache Tomcat was configured to ignore invalid HTTP headers via setting
rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not
reject a request containing an invalid Content-Length header making a
request smuggling attack possible if Tomcat was located behind a reverse
proxy that also failed to reject the request with the invalid header.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-30640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to
authenticate using variations of a valid user name and/or to bypass some of
the protection provided by the LockOut Realm. This update fixes a
regression due to the fix for CVE-2021-30640.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-734-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-734-1-tomcat8/</link>
      <pubDate>Sun, 20 Nov 2022 23:35:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-734-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-734-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u23 (jessie), 8.5.54-0&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23181&#34;&gt;CVE-2022-23181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29885&#34;&gt;CVE-2022-29885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42252&#34;&gt;CVE-2022-42252&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine. The version of Tomcat 8 in Jessie was only affected by
CVE-2022-23181.&lt;/p&gt;
&lt;p&gt;CVE-2022-42252&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If Apache Tomcat was configured to ignore invalid HTTP headers via setting
rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not
reject a request containing an invalid Content-Length header making a
request smuggling attack possible if Tomcat was located behind a reverse
proxy that also failed to reject the request with the invalid header.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23181&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The fix for bug CVE-2020-9484 introduced a time of check, time of use
vulnerability into Apache Tomcat that allowed a local attacker to perform
actions with the privileges of the user that the Tomcat process is using.
This issue is only exploitable when Tomcat is configured to persist
sessions using the FileStore.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-29885&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The documentation of Apache Tomcat for the EncryptInterceptor incorrectly
stated it enabled Tomcat clustering to run over an untrusted network. This
was not correct. While the EncryptInterceptor does provide confidentiality
and integrity protection, it does not protect against all risks associated
with running over any untrusted network, particularly DoS risks.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-733-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-733-1-vim/</link>
      <pubDate>Mon, 14 Nov 2022 13:44:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-733-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-733-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u8 (jessie), 2:8.0.0197-4&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2285&#34;&gt;CVE-2022-2285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2304&#34;&gt;CVE-2022-2304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2946&#34;&gt;CVE-2022-2946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3099&#34;&gt;CVE-2022-3099&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3134&#34;&gt;CVE-2022-3134&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3234&#34;&gt;CVE-2022-3234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3324&#34;&gt;CVE-2022-3324&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in vim, an enhanced vi
editor. Buffer overflows, out-of-bounds reads and use-after-free may lead to a
denial-of-service (application crash) or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-732-1 jackson-databind security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-732-1-jackson-databind/</link>
      <pubDate>Sun, 13 Nov 2022 23:27:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-732-1-jackson-databind/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-732-1-jackson-databind/">
      
&lt;p&gt;Package : jackson-databind&lt;/p&gt;


&lt;p&gt;Version : 2.8.6-1&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42003&#34;&gt;CVE-2022-42003&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42004&#34;&gt;CVE-2022-42004&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several flaws were discovered in jackson-databind, a fast and powerful JSON
library for Java. A denial of service (resource exhaustion) could occur because
of a missing check in primitive value deserializers to avoid deep wrapper array
nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-731-1 sysstat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-731-1-sysstat/</link>
      <pubDate>Mon, 14 Nov 2022 03:30:06 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-731-1-sysstat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-731-1-sysstat/">
      
&lt;p&gt;Package : sysstat&lt;/p&gt;


&lt;p&gt;Version : 11.0.1-1&amp;#43;deb8u1 (jessie), 11.4.3-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39377&#34;&gt;CVE-2022-39377&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;On 32 bit systems, allocate_structures contains a size_t overflow
in sa_common.c. The allocate_structures function insufficiently
checks bounds before arithmetic multiplication, allowing for an
overflow in the size allocated for the buffer representing system
activities. This issue may lead to Remote Code Execution (RCE).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-730-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-730-1-xorg-server/</link>
      <pubDate>Fri, 11 Nov 2022 13:44:15 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-730-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-730-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u8 (jessie), 2:1.19.2-1&amp;#43;deb9u11 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3550&#34;&gt;CVE-2022-3550&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3551&#34;&gt;CVE-2022-3551&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were found in the Xkb extension of the X.org X server,
which could result in denial of service or possibly privilege escalation
if the X server is running privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-729-1 libjettison-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-729-1-libjettison-java/</link>
      <pubDate>Fri, 11 Nov 2022 13:42:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-729-1-libjettison-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-729-1-libjettison-java/">
      
&lt;p&gt;Package : libjettison-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.0-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40149&#34;&gt;CVE-2022-40149&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that libjettison-java, a collection of StAX parsers and
writers for JSON, was vulnerable to a denial-of-service attack, if the attacker
provided untrusted XML or JSON data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-728-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-728-1-sudo/</link>
      <pubDate>Wed, 09 Nov 2022 08:26:57 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-728-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-728-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.19p1-2.1&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23239&#34;&gt;CVE-2021-23239&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a information disclosure vulnerability in
&lt;code&gt;sudo&lt;/code&gt;, a tool used to provide limited superuser privileges to specific users.&lt;/p&gt;
&lt;p&gt;A local unprivileged user may have been able to perform arbitrary
directory-existence tests by exploiting a race condition in &lt;code&gt;sudoedit&lt;/code&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-727-1 ffmpeg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-727-1-ffmpeg/</link>
      <pubDate>Wed, 09 Nov 2022 09:23:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-727-1-ffmpeg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-727-1-ffmpeg/">
      
&lt;p&gt;Package : ffmpeg&lt;/p&gt;


&lt;p&gt;Version : 7:3.2.19-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21697&#34;&gt;CVE-2020-21697&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-726-1 pixman security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-726-1-pixman/</link>
      <pubDate>Tue, 08 Nov 2022 10:44:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-726-1-pixman/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-726-1-pixman/">
      
&lt;p&gt;Package : pixman&lt;/p&gt;


&lt;p&gt;Version : 0.32.6-3&amp;#43;deb8u2 (jessie), 0.34.0-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-44638&#34;&gt;CVE-2022-44638&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Maddie Stone found that pixman, a pixel manipulation and processing library,
was vulnerable to a heap buffer overwrite, which could lead to a denial of
service or potentially other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-724-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-724-1-glibc/</link>
      <pubDate>Mon, 07 Nov 2022 12:32:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-724-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-724-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.24-11&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10228&#34;&gt;CVE-2016-10228&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12132&#34;&gt;CVE-2017-12132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6485&#34;&gt;CVE-2018-6485&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6551&#34;&gt;CVE-2018-6551&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000001&#34;&gt;CVE-2018-1000001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9169&#34;&gt;CVE-2019-9169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19126&#34;&gt;CVE-2019-19126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25013&#34;&gt;CVE-2019-25013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1752&#34;&gt;CVE-2020-1752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10029&#34;&gt;CVE-2020-10029&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27618&#34;&gt;CVE-2020-27618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3326&#34;&gt;CVE-2021-3326&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3999&#34;&gt;CVE-2021-3999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33574&#34;&gt;CVE-2021-33574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35942&#34;&gt;CVE-2021-35942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23218&#34;&gt;CVE-2022-23218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23219&#34;&gt;CVE-2022-23219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes a significant number of minor to important vulnerabilities in
glibc.&lt;/p&gt;
&lt;p&gt;CVE-2016-10228&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv program in the GNU C Library, when invoked with multiple suffixes
in the destination encoding (TRANSLATE or IGNORE) along with the -c option,
enters an infinite loop when processing invalid multi-byte input sequences,
leading to a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-12132&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The DNS stub resolver in the GNU C Library, when EDNS support is enabled,
will solicit large UDP responses from name servers, potentially simplifying
off-path DNS spoofing attacks due to IP fragmentation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6485&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow in the implementation of the posix_memalign in memalign
functions in the GNU C Library could cause these functions to return a
pointer to a heap area that is too small, potentially leading to heap
corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6551&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The malloc implementation in the GNU C Library on powerpc and i386
did not properly handle malloc calls with arguments close to SIZE_MAX
and could return a pointer to a heap region that is smaller than
requested, eventually leading to heap corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1000001&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In glibc is confusion in the usage of getcwd() by realpath() which can be
used to write before the destination buffer leading to a buffer underflow
and potential code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19126&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;On the x86-64 architecture, the GNU C Library fails to ignore the
LD_PREFER_MAP_32BIT_EXEC environment variable during program execution
after a security transition, allowing local attackers to restrict the
possible mapping addresses for loaded libraries and thus bypass ASLR for
a setuid program.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-25013&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv feature in the GNU C Library, when processing invalid multi-byte
input sequences in the EUC-KR encoding, may have a buffer over-read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the GNU C Library, proceed_next_node in posix/regexec.c has a heap-based
buffer over-read via an attempted case-insensitive regular-expression match.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-1752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability in glibc was found in the way the tilde
expansion was carried out.  Directory paths containing an initial tilde
followed by a valid username were affected by this issue. A local attacker
could exploit this flaw by creating a specially crafted path that, when
processed by the glob function, would potentially lead to arbitrary code
execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10029&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The GNU C Library could overflow an on-stack buffer during range
reduction if an input to an 80-bit long double function contains a
non-canonical bit pattern, a seen when passing a
0x5d414141414141410000 value to sinl on x86 targets. This is related
to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv function in the GNU C Library, when processing invalid
multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390,
and IBM1399 encodings, fails to advance the input state, which could
lead to an infinite loop in applications, resulting in a denial of
service, a different vulnerability from CVE-2016-10228.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3326&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv function in the GNU C Library, when processing invalid
input sequences in the ISO-2022-JP-3 encoding, fails an assertion in
the code path and aborts the program, potentially resulting in a
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3999&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in glibc. An off-by-one buffer overflow and underflow
in getcwd() may lead to memory corruption when the size of the buffer
is exactly 1. A local attacker who can control the input buffer and
size passed to getcwd() in a setuid program could use this flaw to
potentially execute arbitrary code and escalate their privileges on
the system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33574&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The mq_notify function in the GNU C Library has a use-after-free. It
may use the notification thread attributes object (passed through
its struct sigevent parameter) after it has been freed by the
caller, leading to a denial of service (application crash) or
possibly unspecified other impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-35942&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The wordexp function in the GNU C Library may crash or read
arbitrary memory in parse_param (in posix/wordexp.c) when called
with an untrusted, crafted pattern, potentially resulting in a
denial of service or disclosure of information. This occurs because
atoi was used but strtoul should have been used to ensure correct
calculations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The deprecated compatibility function svcunix_create in the sunrpc
module of the GNU C Library copies its path argument on the stack
without validating its length, which may result in a buffer
overflow, potentially resulting in a denial of service or (if an
application is not built with a stack protector enabled) arbitrary
code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The deprecated compatibility function clnt_create in the sunrpc
module of the GNU C Library copies its hostname argument on the
stack without validating its length, which may result in a buffer
overflow, potentially resulting in a denial of service or (if an
application is not built with a stack protector enabled) arbitrary
code execution.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-725-1 glibc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-725-1-glibc/</link>
      <pubDate>Mon, 07 Nov 2022 12:32:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-725-1-glibc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-725-1-glibc/">
      
&lt;p&gt;Package : glibc&lt;/p&gt;


&lt;p&gt;Version : 2.19-18&amp;#43;deb8u11 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12132&#34;&gt;CVE-2017-12132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12133&#34;&gt;CVE-2017-12133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15670&#34;&gt;CVE-2017-15670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15671&#34;&gt;CVE-2017-15671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15804&#34;&gt;CVE-2017-15804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16997&#34;&gt;CVE-2017-16997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-1000408&#34;&gt;CVE-2017-1000408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-1000409&#34;&gt;CVE-2017-1000409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6485&#34;&gt;CVE-2018-6485&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6551&#34;&gt;CVE-2018-6551&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11236&#34;&gt;CVE-2018-11236&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000001&#34;&gt;CVE-2018-1000001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9169&#34;&gt;CVE-2019-9169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25013&#34;&gt;CVE-2019-25013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1752&#34;&gt;CVE-2020-1752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10029&#34;&gt;CVE-2020-10029&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27618&#34;&gt;CVE-2020-27618&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29573&#34;&gt;CVE-2020-29573&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3326&#34;&gt;CVE-2021-3326&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3999&#34;&gt;CVE-2021-3999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33574&#34;&gt;CVE-2021-33574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35942&#34;&gt;CVE-2021-35942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23218&#34;&gt;CVE-2022-23218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23219&#34;&gt;CVE-2022-23219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update fixes a significant number of minor to important vulnerabilities in
glibc.&lt;/p&gt;
&lt;p&gt;CVE-2017-12132&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The DNS stub resolver in the GNU C Library, when EDNS support is
enabled, will solicit large UDP responses from name servers,
potentially simplifying off-path DNS spoofing attacks due to IP
fragmentation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-12133&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Use-after-free vulnerability in the clntudp_call function in
sunrpc/clnt_udp.c in the GNU C Library allows remote attackers to
have unspecified impact via vectors related to error path.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-15670&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The GNU C Library contains an off-by- one error leading to a
heap-based buffer overflow in the glob function in glob.c, related
to the processing of home directories using the ~ operator followed
by a long string.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-15671&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The glob function in glob.c in the GNU C Library, when invoked with
GLOB_TILDE, could skip freeing allocated memory when processing the
~ operator with a long user name, potentially leading to a denial of
service (memory leak).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-15804&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The glob function in glob.c in the GNU C Library contains a buffer
overflow during unescaping of user names with the ~ operator.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-16997&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;elf/dl-load.c in the GNU C Library mishandles RPATH and RUNPATH
containing $ORIGIN for a privileged (setuid or AT_SECURE) program,
which allows local users to gain privileges via a Trojan horse
library in the current working directory, related to the
fillin_rpath and decompose_rpath functions.  This is associated with
misinterpretion of an empty RPATH/RUNPATH token as the &amp;quot;./&amp;quot;
directory. NOTE: this configuration of RPATH/RUNPATH for a
privileged program is apparently very uncommon; most likely, no such
program is shipped with any common Linux distribution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-1000408&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak in glibc can be reached and amplified through the
LD_HWCAP_MASK environment variable. Please note that many versions
of glibc are not vulnerable to this issue if patched for
CVE-2017-1000366.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-1000409&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow in glibc can be triggered through the
LD_LIBRARY_PATH environment variable.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6485&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow in the implementation of the posix_memalign in
memalign functions in the GNU C Library could cause these functions
to return a pointer to a heap area that is too small, potentially
leading to heap corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6551&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The malloc implementation in the GNU C Library on powerpc and i386
did not properly handle malloc calls with arguments close to
SIZE_MAX and could return a pointer to a heap region that is smaller
than requested, eventually leading to heap corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-11236&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;stdlib/canonicalize.c in the GNU C Library when processing very long
pathname arguments to the realpath function, could encounter an
integer overflow on 32-bit architectures, leading to a stack-based
buffer overflow and, potentially, arbitrary code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1000001&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In glibc there is confusion in the usage of getcwd() by realpath()
which can be used to write before the destination buffer leading to
a buffer underflow and potential code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the GNU C Library, proceed_next_node in posix/regexec.c has a
heap-based buffer over-read via an attempted case-insensitive
regular-expression match.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-25013&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv feature in the GNU C Library, when processing invalid
multi-byte input sequences in the EUC-KR encoding, may have a buffer
over-read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-1752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability introduced in glibc was found in the
way the tilde expansion was carried out.  Directory paths containing
an initial tilde followed by a valid username were affected by this
issue. A local attacker could exploit this flaw by creating a
specially crafted path that, when processed by the glob function,
would potentially lead to arbitrary code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10029&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The GNU C Library could overflow an on-stack buffer during range
reduction if an input to an 80-bit long double function contains a
non-canonical bit pattern, a seen when passing a
0x5d414141414141410000 value to sinl on x86 targets. This is related
to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27618&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv function in the GNU C Library, when processing invalid
multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390,
and IBM1399 encodings, fails to advance the input state, which could
lead to an infinite loop in applications, resulting in a denial of
service, a different vulnerability from CVE-2016-10228.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-29573&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sysdeps/i386/ldbl2mpn.c in the GNU C Library on x86 targets has a
stack-based buffer overflow if the input to any of the printf family
of functions is an 80-bit long double with a non-canonical bit
pattern, as seen when passing a
\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3326&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The iconv function in the GNU C Library, when processing invalid
input sequences in the ISO-2022-JP-3 encoding, fails an assertion in
the code path and aborts the program, potentially resulting in a
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3999&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in glibc. An off-by-one buffer overflow and underflow
in getcwd() may lead to memory corruption when the size of the buffer
is exactly 1. A local attacker who can control the input buffer and
size passed to getcwd() in a setuid program could use this flaw to
potentially execute arbitrary code and escalate their privileges on
the system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33574&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The mq_notify function in the GNU C Library has a use-after-free. It
may use the notification thread attributes object (passed through
its struct sigevent parameter) after it has been freed by the
caller, leading to a denial of service (application crash) or
possibly unspecified other impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-35942&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The wordexp function in the GNU C Library may crash or read
arbitrary memory in parse_param (in posix/wordexp.c) when called
with an untrusted, crafted pattern, potentially resulting in a
denial of service or disclosure of information. This occurs because
atoi was used but strtoul should have been used to ensure correct
calculations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The deprecated compatibility function svcunix_create in the sunrpc
module of the GNU C Library copies its path argument on the stack
without validating its length, which may result in a buffer
overflow, potentially resulting in a denial of service or (if an
application is not built with a stack protector enabled) arbitrary
code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The deprecated compatibility function clnt_create in the sunrpc
module of the GNU C Library copies its hostname argument on the
stack without validating its length, which may result in a buffer
overflow, potentially resulting in a denial of service or (if an
application is not built with a stack protector enabled) arbitrary
code execution.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-723-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-723-1-linux-5.10/</link>
      <pubDate>Fri, 04 Nov 2022 12:27:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-723-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-723-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.149-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4037&#34;&gt;CVE-2021-4037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0171&#34;&gt;CVE-2022-0171&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1184&#34;&gt;CVE-2022-1184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1679&#34;&gt;CVE-2022-1679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2153&#34;&gt;CVE-2022-2153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2602&#34;&gt;CVE-2022-2602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2663&#34;&gt;CVE-2022-2663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2905&#34;&gt;CVE-2022-2905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3028&#34;&gt;CVE-2022-3028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3061&#34;&gt;CVE-2022-3061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3176&#34;&gt;CVE-2022-3176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3303&#34;&gt;CVE-2022-3303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3586&#34;&gt;CVE-2022-3586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3621&#34;&gt;CVE-2022-3621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3625&#34;&gt;CVE-2022-3625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3629&#34;&gt;CVE-2022-3629&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3633&#34;&gt;CVE-2022-3633&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3635&#34;&gt;CVE-2022-3635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3646&#34;&gt;CVE-2022-3646&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3649&#34;&gt;CVE-2022-3649&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20421&#34;&gt;CVE-2022-20421&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20422&#34;&gt;CVE-2022-20422&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39188&#34;&gt;CVE-2022-39188&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39190&#34;&gt;CVE-2022-39190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39842&#34;&gt;CVE-2022-39842&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40307&#34;&gt;CVE-2022-40307&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41222&#34;&gt;CVE-2022-41222&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41674&#34;&gt;CVE-2022-41674&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42719&#34;&gt;CVE-2022-42719&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42720&#34;&gt;CVE-2022-42720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42721&#34;&gt;CVE-2022-42721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42722&#34;&gt;CVE-2022-42722&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43750&#34;&gt;CVE-2022-43750&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-4037&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Christian Brauner reported that the inode_init_owner function for
the XFS filesystem in the Linux kernel allows local users to
create files with an unintended group ownership allowing attackers
to escalate privileges by making a plain file executable and SGID.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0171&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mingwei Zhang reported that a cache incoherence issue in the SEV
API in the KVM subsystem may result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1184&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the ext4 filesystem driver which can lead
to a use-after-free. A local user permitted to mount arbitrary
filesystems could exploit this to cause a denial of service (crash
or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1679&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the ath9k_htc driver
which can lead to a use-after-free.  This might be exploitable to
cause a denial service (crash or memory corruption) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2153&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;kangel&amp;quot; reported a flaw in the KVM implementation for x86
processors which could lead to a null pointer dereference. A local
user permitted to access /dev/kvm could exploit this to cause a
denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2602&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race between handling an io_uring request and the Unix socket
garbage collector was discovered. An attacker can take advantage
of this flaw for local privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2663&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Leadbeater reported flaws in the nf_conntrack_irc
connection-tracking protocol module. When this module is enabled
on a firewall, an external user on the same IRC network as an
internal user could exploit its lax parsing to open arbitrary TCP
ports in the firewall, to reveal their public IP address, or to
block their IRC connection at the firewall.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2905&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hsin-Wei Hung reported a flaw in the eBPF verifier which can lead
to an out-of-bounds read.  If unprivileged use of eBPF is enabled,
this could leak sensitive information.  This was already disabled
by default, which would fully mitigate the vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3028&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Abhishek Shah reported a race condition in the AF_KEY subsystem,
which could lead to an out-of-bounds write or read.  A local user
could exploit this to cause a denial of service (crash or memory
corruption), to obtain sensitive information, or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3061&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the i740 driver which may result in
denial of service.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3176&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw was discovered in the io_uring subsystem
which may result in local privilege escalation to root.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3303&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition in the snd_pcm_oss_sync function in the sound
subsystem in the Linux kernel due to improper locking may result
in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3586 (ZDI-22-1452)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Zero Day Initiative reported a flaw in the sch_sfb network
scheduler, which may lead to a use-after-free and leak of
sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3621, CVE-2022-3646&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found flaws in the nilfs2 filesystem driver which
can lead to a null pointer dereference or memory leak.  A user
permitted to mount arbitrary filesystem images could use these to
cause a denial of service (crash or resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3625&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the devlink subsystem which can lead to
a use-after-free.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3629&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a memory leak in the Virtual Socket Protocol
implementation.  A local user could exploit this to cause a denial
of service (resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3633&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Linux Verification Center found a memory leak in the SAE J1939
protocol implementation.  A local user could exploit this to cause
a denial of service (resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3635&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Several race conditions were discovered in the idt77252 ATM
driver, which can lead to a use-after-free if the module is
removed.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3649&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found flaws in the nilfs2 filesystem driver which
can lead to a use-after-free.  A user permitted to mount arbitrary
filesystem images could use these to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-20421&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability was discovered in the
binder_inc_ref_for_node function in the Android binder driver. On
systems where the binder driver is loaded, a local user could
exploit this for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-20422&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the instruction emulator for
64-bit Arm systems.  Concurrent changes to the sysctls that
control the emulator could result in a null pointer dereference.
The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39188&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a race condition in the kernel&#39;s handling of
unmapping of certain memory ranges. When a driver created a memory
mapping with the VM_PFNMAP flag, which many GPU drivers do, the
memory mapping could be removed and freed before it was flushed
from the CPU TLBs. This could result in a page use-after-free. A
local user with access to such a device could exploit this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39190&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gwangun Jung reported a flaw in the nf_tables subsystem.  A local
user could exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39842&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow was discovered in the pxa3xx-gcu video driver
which could lead to a heap out-of-bounds write.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-40307&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the EFI capsule-loader driver,
which could lead to use-after-free. A local user permitted to
access this device (/dev/efi_capsule_loader) could exploit this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation. However, this device is normally only
accessible by the root user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41222&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the memory management subsystem
that can lead to stale TLB entries.  A local user could exploit
this to cause a denial of service (memory corruption or crash),
information leak, or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-41674, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721,
CVE-2022-42722&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Soenke Huster discovered several vulnerabilities in the mac80211
subsystem triggered by WLAN frames which may result in denial of
service or the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-43750&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found that the USB monitor (usbmon) driver allowed
user-space programs to overwrite the driver&#39;s data structures.  A
local user permitted to access a USB monitor device could exploit
this to cause a denial of service (memory corruption or crash) or
possibly for privilege escalation.  However, by default only the
root user can access such devices.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update also fixes a regression for some older 32-bit PCs (bug #1017425),
and enables the i10nm_edac driver (bug #1019248). It additionally includes
many more bug fixes from stable updates 5.10.137-5.10.149 inclusive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-722-1 distro-info-data database update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-722-1-distro-info-data/</link>
      <pubDate>Mon, 31 Oct 2022 11:52:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-722-1-distro-info-data/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-722-1-distro-info-data/">
      
&lt;p&gt;Package : distro-info-data&lt;/p&gt;


&lt;p&gt;Version : 0.36~bpo8&amp;#43;2 (jessie), 0.41&amp;#43;deb10u2~bpo9&amp;#43;2 (stretch)&lt;/p&gt;


      &lt;p&gt;This is a routine update of the distro-info-data database for Debian ELTS users.&lt;/p&gt;
&lt;p&gt;It includes a correction to some historical data, and adds newer Debian
and Ubuntu releases up to the current date.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-721-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-721-1-libxml2/</link>
      <pubDate>Sun, 30 Oct 2022 16:59:12 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-721-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-721-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u14 (jessie), 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40303&#34;&gt;CVE-2022-40303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40304&#34;&gt;CVE-2022-40304&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that libxml2, the GNOME XML library, was vulnerable to
integer overflows and memory corruption.&lt;/p&gt;
&lt;p&gt;CVE-2022-40303&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Parsing a XML document with the XML_PARSE_HUGE option enabled can result
 in an integer overflow because safety checks were missing in some
 functions. Also, the xmlParseEntityValue function did not have any length
 limitation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-40304&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; When a reference cycle is detected in the XML entity cleanup function the
 XML entity data can be stored in a dictionary. In this case, the
 dictionary becomes corrupted resulting in logic errors, including memory
 errors like double free.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-720-1 bluez security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-720-1-bluez/</link>
      <pubDate>Sun, 30 Oct 2022 13:00:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-720-1-bluez/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-720-1-bluez/">
      
&lt;p&gt;Package : bluez&lt;/p&gt;


&lt;p&gt;Version : 5.43-2&amp;#43;deb9u2~deb8u5 (jessie), 5.43-2&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0204&#34;&gt;CVE-2022-0204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39176&#34;&gt;CVE-2022-39176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39177&#34;&gt;CVE-2022-39177&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in BlueZ, the Linux Bluetooth protocol stack.&lt;/p&gt;
&lt;p&gt;CVE-2022-0204&lt;/p&gt;
&lt;p&gt;A heap overflow vulnerability was found in bluez. An attacker with local network access
could pass specially crafted files causing an application to halt or crash, leading to
a denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2022-39176&lt;/p&gt;
&lt;p&gt;BlueZ allows physically proximate attackers to obtain sensitive information because
profiles/audio/avrcp.c does not validate params_len.&lt;/p&gt;
&lt;p&gt;CVE-2022-39177&lt;/p&gt;
&lt;p&gt;BlueZ allows physically proximate attackers to cause a denial of service because
malformed and invalid capabilities can be processed in profiles/audio/avdtp.c.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-719-1 graphicsmagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-719-1-graphicsmagick/</link>
      <pubDate>Sun, 30 Oct 2022 02:07:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-719-1-graphicsmagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-719-1-graphicsmagick/">
      
&lt;p&gt;Package : graphicsmagick&lt;/p&gt;


&lt;p&gt;Version : 1.3.20-3&amp;#43;deb8u13 (jessie), 1.3.30&amp;#43;hg15796-1~deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1270&#34;&gt;CVE-2022-1270&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in graphicsmagick, a collection of image processing tools.
Due to missing checks, a crafted MIFF file could result in a heap buffer overflow when parsing it.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-717-1 freerdp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-717-1-freerdp/</link>
      <pubDate>Sat, 29 Oct 2022 15:34:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-717-1-freerdp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-717-1-freerdp/">
      
&lt;p&gt;Package : freerdp&lt;/p&gt;


&lt;p&gt;Version : 1.1.0~git20140921.1.440916e&amp;#43;dfsg1-13&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-4030&#34;&gt;CVE-2020-4030&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-4033&#34;&gt;CVE-2020-4033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11086&#34;&gt;CVE-2020-11086&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11088&#34;&gt;CVE-2020-11088&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11089&#34;&gt;CVE-2020-11089&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11095&#34;&gt;CVE-2020-11095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11096&#34;&gt;CVE-2020-11096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11098&#34;&gt;CVE-2020-11098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41160&#34;&gt;CVE-2021-41160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several memory access vulnerabilities have been discovered in FreeRDP, a
free implementation of Microsoft&amp;rsquo;s Remote Desktop Protocol. These
vulnerabilities could lead to both Denial of Service and access to
privileged memory, like password hashes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-718-1 batik security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-718-1-batik/</link>
      <pubDate>Sat, 29 Oct 2022 01:56:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-718-1-batik/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-718-1-batik/">
      
&lt;p&gt;Package : batik&lt;/p&gt;


&lt;p&gt;Version : 1.7&amp;#43;dfsg-5&amp;#43;deb8u3 (jessie), 1.8-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41704&#34;&gt;CVE-2022-41704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42890&#34;&gt;CVE-2022-42890&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Apache Batik, an SVG library for Java, allowed attackers
to run arbitrary Java code when processing a malicious SVG file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-716-1 djangorestframework security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-716-1-djangorestframework/</link>
      <pubDate>Fri, 28 Oct 2022 09:17:21 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-716-1-djangorestframework/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-716-1-djangorestframework/">
      
&lt;p&gt;Package : djangorestframework&lt;/p&gt;


&lt;p&gt;Version : 3.4.0-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25045&#34;&gt;CVE-2018-25045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25626&#34;&gt;CVE-2020-25626&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two cross-site scripting vulnerabilities were discovered in the Django
Rest Framework, a toolkit to build web APIs.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-715-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-715-1-expat/</link>
      <pubDate>Fri, 28 Oct 2022 07:17:05 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-715-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-715-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-6&amp;#43;deb8u10 (jessie), 2.2.0-2&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-43680&#34;&gt;CVE-2022-43680&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In src:expat, an XML parsing C library, there is a use-after free
caused by overeager destruction of a shared DTD in
XML_ExternalEntityParserCreate in out-of-memory situations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-714-1 menu-cache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-714-1-menu-cache/</link>
      <pubDate>Fri, 28 Oct 2022 00:24:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-714-1-menu-cache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-714-1-menu-cache/">
      
&lt;p&gt;Package : menu-cache&lt;/p&gt;


&lt;p&gt;Version : 1.0.0-1&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8933&#34;&gt;CVE-2017-8933&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that menu-cache, the LXDE implementation of freedesktop&amp;rsquo;s
menu cache, insecurely uses /tmp for a socket file, allowing a local user to
cause a denial of service (menu unavailability).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-713-1 libdatetime-timezone-perl new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-713-1-libdatetime-timezone-perl/</link>
      <pubDate>Wed, 26 Oct 2022 19:50:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-713-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-713-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2022e (jessie), 1:2.09-1&amp;#43;2022e (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022e for the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-712-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-712-1-tzdata/</link>
      <pubDate>Wed, 26 Oct 2022 19:46:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-712-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-712-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u7 (jessie), 2021a-0&amp;#43;deb9u7 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022e. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Syria and Jordan are abandoning the DST regime and are changing to
permanent +03, so they will not fall back from +03 to +02 on
2022-10-28.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition, the jessie version is building tzdata-java again, to make
OpenJDK 7 installable again. Note that that version is unsupported
security-wise though.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-711-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-711-1-openjdk-8/</link>
      <pubDate>Wed, 26 Oct 2022 19:38:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-711-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-711-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u352-ga-1~deb8u1 (jessie), 8u352-ga-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21619&#34;&gt;CVE-2022-21619&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21624&#34;&gt;CVE-2022-21624&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21626&#34;&gt;CVE-2022-21626&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21628&#34;&gt;CVE-2022-21628&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in information disclosure or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-710-1 pjproject security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-710-1-pjproject/</link>
      <pubDate>Wed, 26 Oct 2022 15:11:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-710-1-pjproject/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-710-1-pjproject/">
      
&lt;p&gt;Package : pjproject&lt;/p&gt;


&lt;p&gt;Version : 2.5.5~dfsg-6&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39244&#34;&gt;CVE-2022-39244&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;PJSIP is a free and open source multimedia communication library written in C.
The PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affected by a
buffer overflow vulnerability. Users connecting to untrusted clients are at
risk.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-709-1 libbluray bugfix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-709-1-libbluray/</link>
      <pubDate>Tue, 25 Oct 2022 09:41:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-709-1-libbluray/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-709-1-libbluray/">
      
&lt;p&gt;Package : libbluray&lt;/p&gt;


&lt;p&gt;Version : 1:0.6.2-1&amp;#43;deb8u1 (jessie), 1:0.9.3-3&amp;#43;deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;The latest Java security updates introduced a change that broke libbluray&amp;rsquo;s
interactive BD-J support. This update addresses that, adding compatibility
with recent Java versions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-708-1 libxdmcp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-708-1-libxdmcp/</link>
      <pubDate>Wed, 19 Oct 2022 09:26:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-708-1-libxdmcp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-708-1-libxdmcp/">
      
&lt;p&gt;Package : libxdmcp&lt;/p&gt;


&lt;p&gt;Version : 1:1.1.1-1&amp;#43;deb8u3 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-2625&#34;&gt;CVE-2017-2625&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that libxdmcp 1:1.1.1-1+deb8u1 released as DLA-2006-1 did not
properly apply the fix for CVE-2017-2625. That has been corrected now, the
description for that issue follows:&lt;/p&gt;
&lt;p&gt;libxdmcp, the X11 Display Manager Control Protocol library, used weak entropy
to generate the session keys. A local attacker could brute force the keys to
connect to another user&amp;rsquo;s session.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-707-1 bcel security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-707-1-bcel/</link>
      <pubDate>Tue, 18 Oct 2022 13:36:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-707-1-bcel/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-707-1-bcel/">
      
&lt;p&gt;Package : bcel&lt;/p&gt;


&lt;p&gt;Version : 6.0~rc3-1&amp;#43;deb8u1 (jessie), 6.0-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34169&#34;&gt;CVE-2022-34169&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue
when processing malicious XSLT stylesheets. This can be used to corrupt Java
class files generated by the internal XSLTC compiler and execute arbitrary Java
bytecode. In Debian the vulnerable code is in the bcel source package.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-706-1 libksba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-706-1-libksba/</link>
      <pubDate>Tue, 18 Oct 2022 12:39:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-706-1-libksba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-706-1-libksba/">
      
&lt;p&gt;Package : libksba&lt;/p&gt;


&lt;p&gt;Version : 1.3.2-1&amp;#43;deb8u2 (jessie), 1.3.5-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3515&#34;&gt;CVE-2022-3515&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow flaw was discovered in the CRL parser in libksba, an X.509
and CMS support library, which could result in denial of service or the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-705-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-705-1-qemu/</link>
      <pubDate>Mon, 17 Oct 2022 16:11:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-705-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-705-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u23 (jessie), 1:2.8&amp;#43;dfsg-6&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35504&#34;&gt;CVE-2020-35504&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35505&#34;&gt;CVE-2020-35505&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3507&#34;&gt;CVE-2021-3507&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4206&#34;&gt;CVE-2021-4206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4207&#34;&gt;CVE-2021-4207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0216&#34;&gt;CVE-2022-0216&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in QEMU, a fast processor
emulator, which could result in denial of service or the execution of
arbitrary code.&lt;/p&gt;
&lt;p&gt;In addition, the jessie package addresses CVE-2021-3930, a denial of service
vulnerability in the SCSI device emulation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-704-1 isc-dhcp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-704-1-isc-dhcp/</link>
      <pubDate>Thu, 13 Oct 2022 20:19:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-704-1-isc-dhcp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-704-1-isc-dhcp/">
      
&lt;p&gt;Package : isc-dhcp&lt;/p&gt;


&lt;p&gt;Version : 4.3.1-6&amp;#43;deb8u6 (jessie), 4.3.5-3&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2928&#34;&gt;CVE-2022-2928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2929&#34;&gt;CVE-2022-2929&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the ISC DHCP client,
relay and server.&lt;/p&gt;
&lt;p&gt;CVE-2022-2928&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the DHCP server does not correctly perform
option reference counting when configured with &amp;quot;allow leasequery;&amp;quot;.
A remote attacker can take advantage of this flaw to cause a denial
of service (daemon crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2929&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the DHCP server is prone to a memory leak
flaw when handling contents of option 81 (fqdn) data received in
a DHCP packet. A remote attacker can take advantage of this flaw
to cause DHCP servers to consume resources, resulting in denial
of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-703-1 mediawiki security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-703-1-mediawiki/</link>
      <pubDate>Thu, 13 Oct 2022 00:08:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-703-1-mediawiki/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-703-1-mediawiki/">
      
&lt;p&gt;Package : mediawiki&lt;/p&gt;


&lt;p&gt;Version : 1:1.27.7-1&amp;#43;deb9u13 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-41765&#34;&gt;CVE-2022-41765&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A privacy flaw was discovered in mediawiki, a website engine for collaborative
work. The HTMLUserTextField exposed the existence of hidden users which gave
more insight than actually intended.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-702-1 strongswan security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-702-1-strongswan/</link>
      <pubDate>Mon, 10 Oct 2022 11:40:12 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-702-1-strongswan/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-702-1-strongswan/">
      
&lt;p&gt;Package : strongswan&lt;/p&gt;


&lt;p&gt;Version : 5.5.1-4&amp;#43;deb9u7 (stretch), 5.2.1-6&amp;#43;deb8u10 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40617&#34;&gt;CVE-2022-40617&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential denial of service vulnerability in
strongswan, an IPsec VPN solution.&lt;/p&gt;
&lt;p&gt;Strongswan could have queried URLs with untrusted certificates, and this could
potentially lead to a DoS attack by blocking the fetcher thread.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-701-1 dbus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-701-1-dbus/</link>
      <pubDate>Mon, 10 Oct 2022 14:08:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-701-1-dbus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-701-1-dbus/">
      
&lt;p&gt;Package : dbus&lt;/p&gt;


&lt;p&gt;Version : 1.8.22-0&amp;#43;deb8u5 (jessie), 1.10.32-0&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42010&#34;&gt;CVE-2022-42010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42011&#34;&gt;CVE-2022-42011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-42012&#34;&gt;CVE-2022-42012&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Evgeny Vereshchagin discovered multiple vulnerabilities in D-Bus, a
simple interprocess messaging system, which may result in denial of
service by an authenticated user.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-700-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-700-1-git/</link>
      <pubDate>Mon, 10 Oct 2022 01:02:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-700-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-700-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:2.1.4-2.1&amp;#43;deb8u11 (jessie), 1:2.11.0-3&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21300&#34;&gt;CVE-2021-21300&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40330&#34;&gt;CVE-2021-40330&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Git, a fast, scalable,
distributed revision control system, which may affect multi-user systems.&lt;/p&gt;
&lt;p&gt;CVE-2021-21300&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A specially crafted repository that contains symbolic links as well as
files using a clean/smudge filter such as Git LFS, may cause just-checked
out script to be executed while cloning onto a case-insensitive file system
such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and
macOS).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40330&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;git_connect_git in connect.c allows a repository path to contain a newline
character, which may result in unexpected cross-protocol requests, as
demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1
substring.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-699-1 asterisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-699-1-asterisk/</link>
      <pubDate>Fri, 07 Oct 2022 23:55:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-699-1-asterisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-699-1-asterisk/">
      
&lt;p&gt;Package : asterisk&lt;/p&gt;


&lt;p&gt;Version : 1:13.14.1~dfsg-2&amp;#43;deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35776&#34;&gt;CVE-2020-35776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26651&#34;&gt;CVE-2022-26651&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Asterisk, an Open
Source Private Branch Exchange.&lt;/p&gt;
&lt;p&gt;CVE-2022-26651&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The func_odbc module provides possibly inadequate escaping functionality
for backslash characters in SQL queries, resulting in user-provided data
creating a broken SQL query or possibly a SQL injection.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35776&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow in res_pjsip_diversion.c allows remote attackers to crash
Asterisk by deliberately misusing SIP 181 responses.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-698-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-698-1-bind9/</link>
      <pubDate>Fri, 07 Oct 2022 12:21:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-698-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-698-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u28 (jessie), 1:9.10.3.dfsg.P4-12.3&amp;#43;deb9u13 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2795&#34;&gt;CVE-2022-2795&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38177&#34;&gt;CVE-2022-38177&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in BIND, a DNS server
implementation.&lt;/p&gt;
&lt;p&gt;CVE-2022-2795&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a
flaw in the resolver code can cause named to spend excessive amounts
of time on processing large delegations, significantly degrade
resolver performance and result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-38177&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the DNSSEC verification code for the ECDSA
algorithm is susceptible to a memory leak flaw. A remote attacker
can take advantage of this flaw to cause BIND to consume resources,
resulting in a denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-697-1 libraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-697-1-libraw/</link>
      <pubDate>Tue, 04 Oct 2022 14:30:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-697-1-libraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-697-1-libraw/">
      
&lt;p&gt;Package : libraw&lt;/p&gt;


&lt;p&gt;Version : 0.17.2-6&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5816&#34;&gt;CVE-2018-5816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10528&#34;&gt;CVE-2018-10528&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10529&#34;&gt;CVE-2018-10529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35530&#34;&gt;CVE-2020-35530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35531&#34;&gt;CVE-2020-35531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35532&#34;&gt;CVE-2020-35532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35533&#34;&gt;CVE-2020-35533&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple file format vulnerabilities have been fixed in libraw.&lt;/p&gt;
&lt;p&gt;CVE-2018-5816&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow error within the &amp;quot;identify()&amp;quot;
function (internal/dcraw_common.cpp) in LibRaw versions
prior to 0.18.12 can be exploited to trigger a division by
zero via specially crafted NOKIARAW file (Note: This
vulnerability is caused due to an incomplete fix of
CVE-2018-5804).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10528&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a stack-based buffer overflow in the utf2char
function in libraw_cxx.cpp.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10529&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is an out-of-bounds read affecting the X3F
property table list implementation in libraw_x3f.cpp and
libraw_cxx.cpp.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35530&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In LibRaw, there is an out-of-bounds write vulnerability
within the &amp;quot;new_node()&amp;quot; function
(libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered
via a crafted X3F file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35531&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In LibRaw, an out-of-bounds read vulnerability exists
within the get_huffman_diff() function
(libraw\src\x3f\x3f_utils_patched.cpp) when reading data
from an image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35532&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In LibRaw, an out-of-bounds read vulnerability exists
within the &amp;quot;simple_decode_row()&amp;quot; function
(libraw\src\x3f\x3f_utils_patched.cpp) which can be
triggered via an image with a large row_stride field.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35533&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In LibRaw, an out-of-bounds read vulnerability exists
within the &amp;quot;LibRaw::adobe_copy_pixel()&amp;quot; function
(libraw\src\decoders\dng.cpp) when reading data from the
image file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-696-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-696-1-linux-4.19/</link>
      <pubDate>Tue, 04 Oct 2022 09:31:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-696-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-696-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.260-1~deb8u1 (jessie), 4.19.260-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4159&#34;&gt;CVE-2021-4159&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33655&#34;&gt;CVE-2021-33655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33656&#34;&gt;CVE-2021-33656&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1462&#34;&gt;CVE-2022-1462&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1679&#34;&gt;CVE-2022-1679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2153&#34;&gt;CVE-2022-2153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2318&#34;&gt;CVE-2022-2318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2586&#34;&gt;CVE-2022-2586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2588&#34;&gt;CVE-2022-2588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2663&#34;&gt;CVE-2022-2663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-3028&#34;&gt;CVE-2022-3028&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26365&#34;&gt;CVE-2022-26365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26373&#34;&gt;CVE-2022-26373&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33740&#34;&gt;CVE-2022-33740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33741&#34;&gt;CVE-2022-33741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33742&#34;&gt;CVE-2022-33742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33744&#34;&gt;CVE-2022-33744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36879&#34;&gt;CVE-2022-36879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36946&#34;&gt;CVE-2022-36946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39188&#34;&gt;CVE-2022-39188&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-39842&#34;&gt;CVE-2022-39842&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40307&#34;&gt;CVE-2022-40307&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-4159&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the eBPF verifier which could lead to an
out-of-bounds read.  If unprivileged use of eBPF is enabled, this
could leak sensitive information.  This was already disabled by
default, which would fully mitigate the vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A user with access to a framebuffer console device could cause a
memory out-of-bounds write via the FBIOPUT_VSCREENINFO ioctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33656&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A user with access to a framebuffer console device could cause a
memory out-of-bounds write via some font setting ioctls.  These
obsolete ioctls have been removed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1462&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;一只狗 reported a race condition in the pty (pseudo-terminal)
subsystem that can lead to a slab out-of-bounds write.  A local
user could exploit this to cause a denial of service (crash or
memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1679&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the ath9k_htc driver
which can lead to a use-after-free.  This might be exploitable to
cause a denial service (crash or memory corruption) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2153&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;kangel&amp;quot; reported a flaw in the KVM implementation for x86
processors which could lead to a null pointer dereference. A local
user permitted to access /dev/kvm could exploit this to cause a
denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2318&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in the Amateur Radio X.25 PLP (Rose) support may
result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2586&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in the Netfilter subsystem may result in local
privilege escalation for a user with the CAP_NET_ADMIN capability
in any user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2588&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zhenpeng Lin discovered a use-after-free flaw in the cls_route
filter implementation which may result in local privilege
escalation for a user with the CAP_NET_ADMIN capability in any
user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2663&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Leadbeater reported flaws in the nf_conntrack_irc
connection-tracking protocol module.  When this module is enabled
on a firewall, an external user on the same IRC network as an
internal user could exploit its lax parsing to open arbitrary TCP
ports in the firewall, to reveal their public IP address, or to
block their IRC connection at the firewall.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-3028&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Abhishek Shah reported a race condition in the AF_KEY subsystem,
which could lead to an out-of-bounds write or read.  A local user
could exploit this to cause a denial of service (crash or memory
corruption), to obtain sensitive information, or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Roger Pau Monne discovered that Xen block and network PV device
frontends don&#39;t zero out memory regions before sharing them with
the backend, which may result in information disclosure.
Additionally it was discovered that the granularity of the grant
table doesn&#39;t permit sharing less than a 4k page, which may also
result in information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26373&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that on certain processors with Intel&#39;s Enhanced
Indirect Branch Restricted Speculation (eIBRS) capabilities there
are exceptions to the documented properties in some situations,
which may result in information disclosure.

Intel&#39;s explanation of the issue can be found at
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-33744&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Oleksandr Tyshchenko discovered that ARM Xen guests can cause a
denial of service to the Dom0 via paravirtual devices.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36879&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in xfrm_expand_policies in the xfrm
subsystem which can cause a reference count to be dropped twice.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Domingo Dirutigliano and Nicola Guerrera reported a memory
corruption flaw in the Netfilter subsystem which may result in
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39188&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a race condition in the kernel&#39;s handling of
unmapping of certain memory ranges.  When a driver created a
memory mapping with the VM_PFNMAP flag, which many GPU drivers do,
the memory mapping could be removed and freed before it was
flushed from the CPU TLBs.  This could result in a page use-after-
free.  A local user with access to such a device could exploit
this to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-39842&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow was discovered in the pxa3xx-gcu video driver
which could lead to a heap out-of-bounds write.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-40307&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the EFI capsule-loader driver,
which could lead to use-after-free.  A local user permitted to
access this device (/dev/efi_capsule_loader) could exploit this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation.  However, this device is normally only
accessible by the root user.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-695-1 libdatetime-timezone-perl new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-695-1-libdatetime-timezone-perl/</link>
      <pubDate>Mon, 03 Oct 2022 14:24:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-695-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-695-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2022d (jessie), 1:2.09-1&amp;#43;2022d (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022d for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-694-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-694-1-tzdata/</link>
      <pubDate>Mon, 03 Oct 2022 14:15:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-694-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-694-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u6 (jessie), 2021a-0&amp;#43;deb9u6 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022d. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Palestine now switches back to standard time on October 29.&lt;/li&gt;
&lt;li&gt;Updated leap second list, which was set to expire by the end of
December.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-693-1 snakeyaml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-693-1-snakeyaml/</link>
      <pubDate>Mon, 03 Oct 2022 00:55:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-693-1-snakeyaml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-693-1-snakeyaml/">
      
&lt;p&gt;Package : snakeyaml&lt;/p&gt;


&lt;p&gt;Version : 1.12-2&amp;#43;deb8u1 (jessie), 1.17-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25857&#34;&gt;CVE-2022-25857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38749&#34;&gt;CVE-2022-38749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38750&#34;&gt;CVE-2022-38750&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38751&#34;&gt;CVE-2022-38751&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in SnakeYaml, a YAML
parser for Java, which could facilitate a denial of service attack whenever
maliciously crafted input files are processed by SnakeYaml.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-692-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-692-1-exim4/</link>
      <pubDate>Sat, 01 Oct 2022 18:45:05 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-692-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-692-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.84.2-2&amp;#43;deb8u9 (jessie), 4.89-2&amp;#43;deb9u9 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37452&#34;&gt;CVE-2022-37452&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that in Exim, a mail transport agent, handling an e-mail can
cause a heap-based buffer overflow in some situations. An attacker can cause a
denial-of-service (DoS) and possibly execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-691-1 wkhtmltopdf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-691-1-wkhtmltopdf/</link>
      <pubDate>Sat, 01 Oct 2022 05:35:36 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-691-1-wkhtmltopdf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-691-1-wkhtmltopdf/">
      
&lt;p&gt;Package : wkhtmltopdf&lt;/p&gt;


&lt;p&gt;Version : 0.12.1-2&amp;#43;deb8u1 (jessie), 0.12.3.2-3&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21365&#34;&gt;CVE-2020-21365&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Directory traversal vulnerability in wkhtmltopdf, a set of CLI utilities
to convert html to pdf or image using WebKit, allows remote attackers to
read local files and disclose sensitive information via a crafted html
file running with the default configurations.&lt;/p&gt;
&lt;p&gt;Do note that it&amp;rsquo;s a &lt;em&gt;breaking change&lt;/em&gt;, in the way that the local
filesystem access will be blocked by default. In case you need to enable
or allow it, use &lt;code&gt;--enable-local-file-access&lt;/code&gt;. Another option would be to
use &lt;code&gt;--allow &amp;lt;path&amp;gt;&lt;/code&gt; to specify the folder(s) from which local files are
allowed to be loaded.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-690-1 libvncserver security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-690-1-libvncserver/</link>
      <pubDate>Fri, 30 Sep 2022 00:01:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-690-1-libvncserver/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-690-1-libvncserver/">
      
&lt;p&gt;Package : libvncserver&lt;/p&gt;


&lt;p&gt;Version : 0.9.11&amp;#43;dfsg-1.3~deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29260&#34;&gt;CVE-2020-29260&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libvncserver, a library to write one&amp;rsquo;s own VNC server.
Due to a memory leak in function rfbClientCleanup() a remote attacker might be able to cause a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-689-1 poppler security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-689-1-poppler/</link>
      <pubDate>Thu, 29 Sep 2022 18:34:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-689-1-poppler/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-689-1-poppler/">
      
&lt;p&gt;Package : poppler&lt;/p&gt;


&lt;p&gt;Version : 0.26.5-2&amp;#43;deb8u15 (jessie), 0.48.0-2&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13988&#34;&gt;CVE-2018-13988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18897&#34;&gt;CVE-2018-18897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10873&#34;&gt;CVE-2019-10873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27778&#34;&gt;CVE-2020-27778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27337&#34;&gt;CVE-2022-27337&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-38784&#34;&gt;CVE-2022-38784&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Poppler, a PDF
rendering library, that could lead to denial of service or possibly other
unspecified impact when processing maliciously crafted documents.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-688-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-688-1-openssl/</link>
      <pubDate>Thu, 29 Sep 2022 18:08:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-688-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-688-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u19 (jessie), 1.1.0l-1~deb9u7 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2068&#34;&gt;CVE-2022-2068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2097&#34;&gt;CVE-2022-2097&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the c_rehash script included in OpenSSL did not
sanitise shell meta characters which could result in the execution of
arbitrary commands.&lt;/p&gt;
&lt;p&gt;In addition, the stretch package addresses CVE-2022-2097, an information
disclosure issue in the AES OCB assembly implementation for the x86
architecture.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-687-1 liblouis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-687-1-liblouis/</link>
      <pubDate>Tue, 27 Sep 2022 13:41:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-687-1-liblouis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-687-1-liblouis/">
      
&lt;p&gt;Package : liblouis&lt;/p&gt;


&lt;p&gt;Version : 3.0.0-3&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26981&#34;&gt;CVE-2022-26981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31783&#34;&gt;CVE-2022-31783&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two buffer overwrite vulnerabilities were found in liblouis, a braille
translator library, that could cause denial of service or have other
unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-686-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-686-1-expat/</link>
      <pubDate>Sun, 25 Sep 2022 10:29:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-686-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-686-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-6&amp;#43;deb8u9 (jessie), 2.2.0-2&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40674&#34;&gt;CVE-2022-40674&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Rhodri James discovered a heap use-after-free vulnerability in the doContent function in Expat, an XML parsing C library, which could result in denial of service or potentially the execution of arbitrary code, if a malformed XML file is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-685-1 ntfs-3g security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-685-1-ntfs-3g/</link>
      <pubDate>Sat, 24 Sep 2022 00:36:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-685-1-ntfs-3g/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-685-1-ntfs-3g/">
      
&lt;p&gt;Package : ntfs-3g&lt;/p&gt;


&lt;p&gt;Version : 1:2014.2.15AR.2-1&amp;#43;deb8u6 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46790&#34;&gt;CVE-2021-46790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30783&#34;&gt;CVE-2022-30783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30784&#34;&gt;CVE-2022-30784&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30785&#34;&gt;CVE-2022-30785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30786&#34;&gt;CVE-2022-30786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30787&#34;&gt;CVE-2022-30787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30788&#34;&gt;CVE-2022-30788&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30789&#34;&gt;CVE-2022-30789&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in NTFS-3G, a read-write NTFS driver for FUSE. A local user can take advantage of these flaws for local root privilege escalation.&lt;/p&gt;
&lt;p&gt;CVE-2022-30783&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic between NTFS-3G and the kernel when using libfuse-lite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30784&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30785&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A file handle created in fuse_lib_opendir, and later used in fuse_lib_readdir, enables arbitrary memory read and write operations when using libfuse-lite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30786&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30787&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer underflow in fuse_lib_readdir enables arbitrary memory read operations when using libfuse-lite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30788&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30789&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-46790&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A crafted NTFS image can cause a heap-based buffer overflow in ntfsck.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-684-1 pdftk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-684-1-pdftk/</link>
      <pubDate>Fri, 23 Sep 2022 11:42:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-684-1-pdftk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-684-1-pdftk/">
      
&lt;p&gt;Package : pdftk&lt;/p&gt;


&lt;p&gt;Version : 2.02-2&amp;#43;deb8u1 (jessie), 2.02-4&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37819&#34;&gt;CVE-2021-37819&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that PDFtk, a tool for manipulating PDF documents, was
vulnerable to an infinite loop if a crafted file was processed, which
could result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-683-1 unzip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-683-1-unzip/</link>
      <pubDate>Thu, 22 Sep 2022 18:55:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-683-1-unzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-683-1-unzip/">
      
&lt;p&gt;Package : unzip&lt;/p&gt;


&lt;p&gt;Version : 6.0-16&amp;#43;deb8u7 (jessie), 6.0-21&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0529&#34;&gt;CVE-2022-0529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0530&#34;&gt;CVE-2022-0530&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Sandipan Roy discovered two vulnerabilities in InfoZIP&amp;rsquo;s unzip program,
a de-archiver for .zip files, which could result in denial of service
or potentially the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-682-1 open-vm-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-682-1-open-vm-tools/</link>
      <pubDate>Wed, 21 Sep 2022 23:47:28 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-682-1-open-vm-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-682-1-open-vm-tools/">
      
&lt;p&gt;Package : open-vm-tools&lt;/p&gt;


&lt;p&gt;Version : 2:10.1.5-5055683-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31676&#34;&gt;CVE-2022-31676&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in open-vm-tools, an open source
implementation of VMware Tools, allowing an unprivileged local
guest user to escalate their privileges as root user in the virtual
machine.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-681-1 mako security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-681-1-mako/</link>
      <pubDate>Wed, 21 Sep 2022 18:07:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-681-1-mako/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-681-1-mako/">
      
&lt;p&gt;Package : mako&lt;/p&gt;


&lt;p&gt;Version : 1.0.0&amp;#43;dfsg-0.1&amp;#43;deb8u1 (jessie), 1.0.6&amp;#43;ds1-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-40023&#34;&gt;CVE-2022-40023&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that Mako, a Python template library, was vulnerable to a
denial of service attack via crafted regular expressions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-680-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-680-1-intel-microcode/</link>
      <pubDate>Mon, 19 Sep 2022 12:13:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-680-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-680-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20220510.1~deb8u1 (jessie), 3.20220510.1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0127&#34;&gt;CVE-2021-0127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0145&#34;&gt;CVE-2021-0145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33117&#34;&gt;CVE-2021-33117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33120&#34;&gt;CVE-2021-33120&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21123&#34;&gt;CVE-2022-21123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21125&#34;&gt;CVE-2022-21125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21127&#34;&gt;CVE-2022-21127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21151&#34;&gt;CVE-2022-21151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21166&#34;&gt;CVE-2022-21166&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for some types of Intel CPUs
and provides mitigations for security vulnerabilities which could
result in information disclosure or denial or service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-679-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-679-1-glib2.0/</link>
      <pubDate>Thu, 15 Sep 2022 17:23:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-679-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-679-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.42.1-1&amp;#43;deb8u5 (jessie), 2.50.3-2&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3800&#34;&gt;CVE-2021-3800&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that GLib, a general-purpose portable utility library,
could be used to print partial contents from arbitrary files. This
could be exploited from setuid binaries linking to GLib for information
disclosure of files with a specific format.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-678-1 sqlite3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-678-1-sqlite3/</link>
      <pubDate>Thu, 15 Sep 2022 08:48:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-678-1-sqlite3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-678-1-sqlite3/">
      
&lt;p&gt;Package : sqlite3&lt;/p&gt;


&lt;p&gt;Version : 3.8.7.1-1&amp;#43;deb8u8 (jessie), 3.16.2-5&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35525&#34;&gt;CVE-2020-35525&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential null pointer dereference vulnerability was discovered in the
popular embedded database engine SQLite related to INTERSEC query processing.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-677-1 zlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-677-1-zlib/</link>
      <pubDate>Mon, 12 Sep 2022 11:06:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-677-1-zlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-677-1-zlib/">
      
&lt;p&gt;Package : zlib&lt;/p&gt;


&lt;p&gt;Version : 1:1.2.8.dfsg-2&amp;#43;deb8u3 (jessie), 1:1.2.8.dfsg-5&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-37434&#34;&gt;CVE-2022-37434&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Evgeny Legerov reported a heap-based buffer overflow vulnerability in
the inflate operation in zlib, which could result in denial of service
or potentially the execution of arbitrary code if specially crafted
input is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-676-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-676-1-linux-5.10/</link>
      <pubDate>Fri, 09 Sep 2022 10:38:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-676-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-676-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.136-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2585&#34;&gt;CVE-2022-2585&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2586&#34;&gt;CVE-2022-2586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2588&#34;&gt;CVE-2022-2588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23816&#34;&gt;CVE-2022-23816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26373&#34;&gt;CVE-2022-26373&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29900&#34;&gt;CVE-2022-29900&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29901&#34;&gt;CVE-2022-29901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36879&#34;&gt;CVE-2022-36879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-36946&#34;&gt;CVE-2022-36946&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2022-2585&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free flaw in the implementation of POSIX CPU timers may
result in denial of service or in local privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2586&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in the Netfilter subsystem may result in local
privilege escalation for a user with the CAP_NET_ADMIN capability in
any user or network namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2588&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zhenpeng Lin discovered a use-after-free flaw in the cls_route
filter implementation which may result in local privilege escalation
for a user with the CAP_NET_ADMIN capability in any user or network
namespace.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26373&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that on certain processors with Intel&#39;s Enhanced
Indirect Branch Restricted Speculation (eIBRS) capabilities there
are exceptions to the documented properties in some situations,
which may result in information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;Intel&amp;rsquo;s explanation of the issue can be found at &lt;a href=&#34;https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/post-barrier-return-stack-buffer-predictions.html&#34;&gt;the Intel advisory&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;CVE-2022-29900&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Johannes Wikner and Kaveh Razavi reported that for AMD/Hygon
processors, mis-trained branch predictions for return instructions
may allow arbitrary speculative code execution under certain
microarchitecture-dependent conditions.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;A list of affected AMD CPU types can be found at &lt;a href=&#34;https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037&#34;&gt;the AMD bulletin&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;CVE-2022-29901&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Johannes Wikner and Kaveh Razavi reported that for Intel processors
(Intel Core generation 6, 7 and 8), protections against speculative
branch target injection attacks were insufficient in some
circumstances, which may allow arbitrary speculative code execution
under certain microarchitecture-dependent conditions.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;More information can be found at &lt;a href=&#34;https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html&#34;&gt;the Intel advisory&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;CVE-2022-36879&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in xfrm_expand_policies in the xfrm subsystem
which can cause a reference count to be dropped twice.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-36946&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Domingo Dirutigliano and Nicola Guerrera reported a memory
corruption flaw in the Netfilter subsystem which may result in
denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-675-1 systemd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-675-1-systemd/</link>
      <pubDate>Tue, 06 Sep 2022 17:25:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-675-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-675-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 232-25&amp;#43;deb9u15 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2526&#34;&gt;CVE-2022-2526&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A use-after-free vulnerability was found in systemd, a system and service
manager. This issue occurs due to the on_stream_io() function and
dns_stream_complete() function in &amp;lsquo;resolved-dns-stream.c&amp;rsquo; not incrementing the
reference counting for the DnsStream object. Therefore, other functions and
callbacks called can dereference the DNSStream object, causing the
use-after-free when the reference is still used later.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-674-1 mediawiki security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-674-1-mediawiki/</link>
      <pubDate>Mon, 05 Sep 2022 22:00:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-674-1-mediawiki/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-674-1-mediawiki/">
      
&lt;p&gt;Package : mediawiki&lt;/p&gt;


&lt;p&gt;Version : 1:1.27.7-1&amp;#43;deb9u12 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28201&#34;&gt;CVE-2022-28201&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28202&#34;&gt;CVE-2022-28202&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34911&#34;&gt;CVE-2022-34911&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34912&#34;&gt;CVE-2022-34912&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were discovered in mediawiki, a website engine
for collaborative work. Insufficiently escaped input text may allow a malicious
user to perform cross-site-scripting (XSS) attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-673-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-673-1-ghostscript/</link>
      <pubDate>Sat, 03 Sep 2022 23:24:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-673-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-673-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u10 (jessie), 9.26a~dfsg-0&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27792&#34;&gt;CVE-2020-27792&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A heap-based buffer over write vulnerability was found in GhostScript, the GPL
PostScript/PDF interpreter. An attacker could trick a user to open a crafted
PDF file, triggering the heap buffer overflow that could lead to memory
corruption or a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-672-1 grunt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-672-1-grunt/</link>
      <pubDate>Sun, 04 Sep 2022 02:41:12 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-672-1-grunt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-672-1-grunt/">
      
&lt;p&gt;Package : grunt&lt;/p&gt;


&lt;p&gt;Version : 1.0.1-5&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0436&#34;&gt;CVE-2022-0436&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Grunt is a JavaScript task runner, a tool used to automatically perform
frequent tasks such as minification, compilation, unit testing, and linting.
In GruntJS, file.copy operations in GruntJS are not protected against
symlink traversal for both source and destination directories.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-671-1 ruby-tzinfo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-671-1-ruby-tzinfo/</link>
      <pubDate>Sun, 04 Sep 2022 02:31:35 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-671-1-ruby-tzinfo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-671-1-ruby-tzinfo/">
      
&lt;p&gt;Package : ruby-tzinfo&lt;/p&gt;


&lt;p&gt;Version : 1.2.2-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31163&#34;&gt;CVE-2022-31163&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential directory traversal
vulnerablilty in ruby-tzinfo, a timezone library for the Ruby
programming language.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-670-1 http-parser security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-670-1-http-parser/</link>
      <pubDate>Wed, 31 Aug 2022 10:44:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-670-1-http-parser/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-670-1-http-parser/">
      
&lt;p&gt;Package : http-parser&lt;/p&gt;


&lt;p&gt;Version : 2.1-2&amp;#43;deb8u1 (jessie), 2.1-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8287&#34;&gt;CVE-2020-8287&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There was a potential HTTP request smuggling vulnerability in http-parser, a
popular library for parsing HTTP messages.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-668-1 net-snmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-668-1-net-snmp/</link>
      <pubDate>Tue, 30 Aug 2022 16:18:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-668-1-net-snmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-668-1-net-snmp/">
      
&lt;p&gt;Package : net-snmp&lt;/p&gt;


&lt;p&gt;Version : 5.7.2.1&amp;#43;dfsg-1&amp;#43;deb8u5 (jessie), 5.7.3&amp;#43;dfsg-1.7&amp;#43;deb9u4 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24805&#34;&gt;CVE-2022-24805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24806&#34;&gt;CVE-2022-24806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24807&#34;&gt;CVE-2022-24807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24808&#34;&gt;CVE-2022-24808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24809&#34;&gt;CVE-2022-24809&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24810&#34;&gt;CVE-2022-24810&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yu Zhang and Nanyu Zhong discovered several vulnerabilities in net-snmp,
a suite of Simple Network Management Protocol applications, which could
result in denial of service or the execution of arbitrary code&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-667-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-667-1-gst-plugins-good1.0/</link>
      <pubDate>Sat, 27 Aug 2022 00:52:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-667-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-667-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u5 (jessie), 1.10.4-1&amp;#43;deb9u2 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1920&#34;&gt;CVE-2022-1920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1921&#34;&gt;CVE-2022-1921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1922&#34;&gt;CVE-2022-1922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1923&#34;&gt;CVE-2022-1923&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1924&#34;&gt;CVE-2022-1924&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1925&#34;&gt;CVE-2022-1925&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2122&#34;&gt;CVE-2022-2122&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Adam Doupe discovered multiple vulnerabilities in package gst-plugins-good1.0,
which contains Gstreamer plugins from the &amp;ldquo;good&amp;rdquo; set.
The issues are within the plugins to demux Mastroska and AVI files, which could
result in denial of service or the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-666-1 sqlite3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-666-1-sqlite3/</link>
      <pubDate>Thu, 25 Aug 2022 11:49:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-666-1-sqlite3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-666-1-sqlite3/">
      
&lt;p&gt;Package : sqlite3&lt;/p&gt;


&lt;p&gt;Version : 3.8.7.1-1&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16168&#34;&gt;CVE-2019-16168&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20218&#34;&gt;CVE-2019-20218&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple fixes for vulnerabilities were backported from Debian stretch to
Debian jessie. The two fixed vulnerabilities could result in crashes when
working with BTree indexes, and in unexpected behaviour after parsing errors
in WITH clauses.&lt;/p&gt;
&lt;p&gt;Debian 9 stretch is not affected, the changes have been delivered there
before.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-665-1 vlc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-665-1-vlc/</link>
      <pubDate>Sun, 21 Aug 2022 12:12:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-665-1-vlc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-665-1-vlc/">
      
&lt;p&gt;Package : vlc&lt;/p&gt;


&lt;p&gt;Version : 3.0.17.4-0&amp;#43;deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in the VLC media player, which
could result in the execution of arbitrary code or denial of service if
a malformed file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-664-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-664-1-curl/</link>
      <pubDate>Sun, 21 Aug 2022 01:17:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-664-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-664-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u23 (jessie), 7.52.1-5&amp;#43;deb9u17 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22576&#34;&gt;CVE-2022-22576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27776&#34;&gt;CVE-2022-27776&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27781&#34;&gt;CVE-2022-27781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32208&#34;&gt;CVE-2022-32208&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in cURL, an URL transfer
library. These flaws may allow remote attackers to obtain sensitive
information, leak authentication or cookie header data or facilitate a denial
of service attack.&lt;/p&gt;
&lt;p&gt;The following CVE has been additionally addressed in Debian 9 &amp;ldquo;Stretch&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;CVE-2022-27782&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libcurl would reuse a previously created connection even when a TLS or SSH
related option had been changed that should have prohibited reuse. libcurl
keeps previously used connections in a connection pool for subsequent
transfers to reuse if one of them matches the setup. However, several TLS and
SSH settings were left out from the configuration match checks, making them
match too easily.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-663-1 libdatetime-timezone-perl new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-663-1-libdatetime-timezone-perl/</link>
      <pubDate>Fri, 19 Aug 2022 11:41:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-663-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-663-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2022c (jessie), 1:2.09-1&amp;#43;2022c (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022c for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-662-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-662-1-tzdata/</link>
      <pubDate>Fri, 19 Aug 2022 11:30:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-662-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-662-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u5 (jessie), 2021a-0&amp;#43;deb9u5 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022b. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Iran plans to stop observing DST permanently, after it falls back
on 2022-09-21.&lt;/li&gt;
&lt;li&gt;Chile&amp;rsquo;s 2022 DST start is delayed from September 4 to September 11.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note that for jessie, the tzdata-java package which was built for Java 7
is no longer provided, as Java 7 is no longer supported.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-661-1 linux-5.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-661-1-linux-5.10/</link>
      <pubDate>Wed, 10 Aug 2022 11:44:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-661-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-661-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.127-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33655&#34;&gt;CVE-2021-33655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2318&#34;&gt;CVE-2022-2318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26365&#34;&gt;CVE-2022-26365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33740&#34;&gt;CVE-2022-33740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33741&#34;&gt;CVE-2022-33741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33742&#34;&gt;CVE-2022-33742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33743&#34;&gt;CVE-2022-33743&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33744&#34;&gt;CVE-2022-33744&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34918&#34;&gt;CVE-2022-34918&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that may
lead to privilege escalation, denial of service or information leaks:&lt;/p&gt;
&lt;p&gt;CVE-2021-33655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A user with access to a framebuffer console driver could cause a
memory out-of-bounds write via the FBIOPUT_VSCREENINFO ioctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2318&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free in the Amateur Radio X.25 PLP (Rose) support may
result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26365 / CVE-2022-33740 / CVE-2022-33741 / CVE-2022-33742&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Roger Pau Monne discovered that Xen block and network PV device
frontends don&#39;t zero out memory regions before sharing them with the
backend, which may result in information disclosure. Additionally it
was discovered that the granularity of the grant table doesn&#39;t permit
sharing less than a 4k page, which may also result in information
disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-33743&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jan Beulich discovered that incorrect memory handling in the Xen
network backend may lead to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-33744&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Oleksandr Tyshchenko discovered that ARM Xen guests can cause a denial
of service to the Dom0 via paravirtual devices.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-34918&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Arthur Mongodin discovered a heap buffer overflow in the Netfilter
subsystem which may result in local privilege escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-660-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-660-1-squid3/</link>
      <pubDate>Mon, 08 Aug 2022 07:46:36 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-660-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-660-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u5 (jessie), 3.5.23-5&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28116&#34;&gt;CVE-2021-28116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46784&#34;&gt;CVE-2021-46784&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in squid3, a popular HTTP caching proxy:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-28116: Squid through 4.14 and 5.x through 5.0.5, in some
configurations, allows information disclosure because of an out-of-bounds
read in WCCP protocol data. This can be leveraged as part of a chain for
remote code execution as nobody.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-46784: In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x
before 5.6, due to improper buffer management, a Denial of Service can occur
when processing long Gopher server responses.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-659-1 mod-wsgi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-659-1-mod-wsgi/</link>
      <pubDate>Sun, 07 Aug 2022 01:21:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-659-1-mod-wsgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-659-1-mod-wsgi/">
      
&lt;p&gt;Package : mod-wsgi&lt;/p&gt;


&lt;p&gt;Version : 4.5.11-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2255&#34;&gt;CVE-2022-2255&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in mod-wsgi, a Python WSGI adapter module for Apache.
A request from an untrusted proxy does not remove the X-Client-IP header and thus allowing this header to be passed to the target WSGI application.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-658-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-658-1-libxslt/</link>
      <pubDate>Fri, 05 Aug 2022 08:21:49 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-658-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-658-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.28-2&amp;#43;deb8u7 (jessie), 1.1.29-2.1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5815&#34;&gt;CVE-2019-5815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30560&#34;&gt;CVE-2021-30560&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in libxslt, an XML processing library:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-5815: Type confusion in xsltNumberFormatGetMultipleLevel prior to
libxslt 1.1.33 could allow attackers to potentially exploit heap corruption
via crafted XML data.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-30560: Use after free in Blink XSLT in Google Chrome prior to
91.0.4472.164 allowed a remote attacker to potentially exploit heap
corruption via a crafted HTML page.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-657-1 ruby-rack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-657-1-ruby-rack/</link>
      <pubDate>Wed, 03 Aug 2022 10:57:34 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-657-1-ruby-rack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-657-1-ruby-rack/">
      
&lt;p&gt;Package : ruby-rack&lt;/p&gt;


&lt;p&gt;Version : 1.6.4-4&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30122&#34;&gt;CVE-2022-30122&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30123&#34;&gt;CVE-2022-30123&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in &lt;code&gt;ruby-rack&lt;/code&gt;, a popular Ruby webserver:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-30122: Prevent a Denial of Service (DoS) vulnerability in the HTTP
multipart parsing.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-30123: Prevent a potential shell escape sequence injection
vulnerability that could be triggered through the logging system.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-656-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-656-1-libxml2/</link>
      <pubDate>Wed, 03 Aug 2022 08:25:21 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-656-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-656-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.4&amp;#43;dfsg1-2.2&amp;#43;deb9u8 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-3709&#34;&gt;CVE-2016-3709&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A cross-site scripting vulnerability was discovered in libxml2, a widely used
XML parsing library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-655-1 libhttp-daemon-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-655-1-libhttp-daemon-perl/</link>
      <pubDate>Mon, 01 Aug 2022 11:25:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-655-1-libhttp-daemon-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-655-1-libhttp-daemon-perl/">
      
&lt;p&gt;Package : libhttp-daemon-perl&lt;/p&gt;


&lt;p&gt;Version : 6.01-1&amp;#43;deb8u1 (jessie), 6.01-1&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31081&#34;&gt;CVE-2022-31081&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libhttp-daemon-perl, a simple http server class.
Due to insufficient Content-Length: handling in HTTP-header an attacker could gain privileged access to APIs or poison intermediate caches.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-654-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-654-1-xorg-server/</link>
      <pubDate>Tue, 26 Jul 2022 17:23:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-654-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-654-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u7 (jessie), 2:1.19.2-1&amp;#43;deb9u10 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2319&#34;&gt;CVE-2022-2319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2320&#34;&gt;CVE-2022-2320&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered two out of bound memory writes in X.Org Server&amp;rsquo;s
ProcXkbSetGeometry and ProcXkbSetDeviceInfo Xkb extensions. These issues could
be exploited by an attacker to cause denial of service, privilege escalation
or arbitrary code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-653-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-653-1-openjdk-8/</link>
      <pubDate>Tue, 26 Jul 2022 14:52:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-653-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-653-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u342-b07-1~deb8u1 (jessie), 8u342-b07-1~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21540&#34;&gt;CVE-2022-21540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21541&#34;&gt;CVE-2022-21541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34169&#34;&gt;CVE-2022-34169&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in information disclosure, unauthorized access
or code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-652-1 linux-4.19 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-652-1-linux-4.19/</link>
      <pubDate>Tue, 26 Jul 2022 10:32:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-652-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-652-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.249-2~deb8u1 (jessie), 4.19.249-2~deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4197&#34;&gt;CVE-2021-4197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0494&#34;&gt;CVE-2022-0494&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0812&#34;&gt;CVE-2022-0812&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0854&#34;&gt;CVE-2022-0854&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1011&#34;&gt;CVE-2022-1011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1012&#34;&gt;CVE-2022-1012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1016&#34;&gt;CVE-2022-1016&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1048&#34;&gt;CVE-2022-1048&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1184&#34;&gt;CVE-2022-1184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1195&#34;&gt;CVE-2022-1195&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1198&#34;&gt;CVE-2022-1198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1199&#34;&gt;CVE-2022-1199&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1204&#34;&gt;CVE-2022-1204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1205&#34;&gt;CVE-2022-1205&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1353&#34;&gt;CVE-2022-1353&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1419&#34;&gt;CVE-2022-1419&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1516&#34;&gt;CVE-2022-1516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1652&#34;&gt;CVE-2022-1652&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1729&#34;&gt;CVE-2022-1729&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1734&#34;&gt;CVE-2022-1734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1974&#34;&gt;CVE-2022-1974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1975&#34;&gt;CVE-2022-1975&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2153&#34;&gt;CVE-2022-2153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21123&#34;&gt;CVE-2022-21123&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21125&#34;&gt;CVE-2022-21125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21166&#34;&gt;CVE-2022-21166&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23960&#34;&gt;CVE-2022-23960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26490&#34;&gt;CVE-2022-26490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27666&#34;&gt;CVE-2022-27666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28356&#34;&gt;CVE-2022-28356&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28388&#34;&gt;CVE-2022-28388&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28389&#34;&gt;CVE-2022-28389&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28390&#34;&gt;CVE-2022-28390&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29581&#34;&gt;CVE-2022-29581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30594&#34;&gt;CVE-2022-30594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32250&#34;&gt;CVE-2022-32250&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32296&#34;&gt;CVE-2022-32296&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-33981&#34;&gt;CVE-2022-33981&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-4197&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Eric Biederman reported that incorrect permission checks in the
cgroup process migration implementation can allow a local attacker
to escalate privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0494&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The scsi_ioctl() was susceptible to an information leak only
exploitable by users with CAP_SYS_ADMIN or CAP_SYS_RAWIO
capabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0812&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the RDMA transport for NFS (xprtrdma)
miscalculated the size of message headers, which could lead to a
leak of sensitive information between NFS servers and clients.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0854&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ali Haider discovered a potential information leak in the DMA
subsystem. On systems where the swiotlb feature is needed, this
might allow a local user to read sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1011&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered a flaw in the FUSE (Filesystem in User-Space)
implementation. A local user permitted to mount FUSE filesystems
could exploit this to cause a use-after-free and read sensitive
information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1012, CVE-2022-32296&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Moshe Kol, Amit Klein, and Yossi Gilad discovered a weakness
in randomisation of TCP source port selection.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1016&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Bouman discovered a flaw in the netfilter subsystem where
the nft_do_chain function did not initialize register data that
nf_tables expressions can read from and write to. A local attacker
can take advantage of this to read sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1048&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hu Jiahui discovered a race condition in the sound subsystem that
can result in a use-after-free. A local user permitted to access a
PCM sound device can take advantage of this flaw to crash the
system or potentially for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1184&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the ext4 filesystem driver which can lead
to a use-after-free. A local user permitted to mount arbitrary
filesystems could exploit this to cause a denial of service (crash
or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1195&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lin Ma discovered race conditions in the 6pack and mkiss hamradio
drivers, which could lead to a use-after-free. A local user could
exploit these to cause a denial of service (memory corruption or
crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1198&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Duoming Zhou discovered a race condition in the 6pack hamradio
driver, which could lead to a use-after-free. A local user could
exploit this to cause a denial of service (memory corruption or
crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1199, CVE-2022-1204, CVE-2022-1205&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Duoming Zhou discovered race conditions in the AX.25 hamradio
protocol, which could lead to a use-after-free or null pointer
dereference. A local user could exploit this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1353&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The TCS Robot tool found an information leak in the PF_KEY
subsystem. A local user can receive a netlink message when an
IPsec daemon registers with the kernel, and this could include
sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1419&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Minh Yuan discovered a race condition in the vgem virtual GPU
driver that can lead to a use-after-free. A local user permitted
to access the GPU device can exploit this to cause a denial of
service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1516&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference flaw in the implementation of the X.25
set of standardized network protocols, which can result in denial
of service.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1652&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Minh Yuan discovered a race condition in the floppy driver that
can lead to a use-after-free. A local user permitted to access a
floppy drive device can exploit this to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1729&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Norbert Slusarek discovered a race condition in the perf subsystem
which could result in local privilege escalation to root. The
default settings in Debian prevent exploitation unless more
permissive settings have been applied in the
kernel.perf_event_paranoid sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1734&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Duoming Zhou discovered race conditions in the nfcmrvl NFC driver
that could lead to a use-after-free, double-free or null pointer
dereference. A local user might be able to exploit these for
denial of service (crash or memory corruption) or possibly for
privilege escalation.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-1974, CVE-2022-1975&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Duoming Zhou discovered that the NFC netlink interface was
suspectible to denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-2153&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;kangel&amp;quot; reported a flaw in the KVM implementation for x86
processors which could lead to a null pointer dereference. A local
user permitted to access /dev/kvm could exploit this to cause a
denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-21123, CVE-2022-21125, CVE-2022-21166&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Various researchers discovered flaws in Intel x86 processors,
collectively referred to as MMIO Stale Data vulnerabilities.
These are similar to the previously published Microarchitectural
Data Sampling (MDS) issues and could be exploited by local users
to leak sensitive information.

For some CPUs, the mitigations for these issues require updated
microcode.  An updated intel-microcode package may be provided at
a later date.  The updated CPU microcode may also be available as
part of a system firmware (&amp;quot;BIOS&amp;quot;) update.

Further information on the mitigation can be found at
&amp;lt;https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html&amp;gt;
or in the linux-doc-4.19 package.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-23960&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Researchers at VUSec discovered that the Branch History Buffer in
Arm processors can be exploited to create information side-
channels with speculative execution.  This issue is similar to
Spectre variant 2, but requires additional mitigations on some
processors.

This was previously mitigated for 32-bit Arm (armel and armhf)
architectures and is now also mitigated for 64-bit Arm (arm64).

This can be exploited to obtain sensitive information from a
different security context, such as from user-space to the kernel,
or from a KVM guest to the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-26490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer overflows in the STMicroelectronics ST21NFCA core driver
can result in denial of service or privilege escalation.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-27666&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;valis&amp;quot; reported a possible buffer overflow in the IPsec ESP
transformation code. A local user can take advantage of this flaw
to cause a denial of service or for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28356&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;Beraphin&amp;quot; discovered that the ANSI/IEEE 802.2 LLC type 2 driver did
not properly perform reference counting on some error paths. A
local attacker can take advantage of this flaw to cause a denial
of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28388&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A double free vulnerability was discovered in the 8 devices
USB2CAN interface driver.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28389&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A double free vulnerability was discovered in the Microchip CAN
BUS Analyzer interface driver.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28390&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A double free vulnerability was discovered in the EMS CPC-USB/ARM7
CAN/USB interface driver.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-29581&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyle Zeng discovered a reference-counting bug in the cls_u32
network classifier which can lead to a use-after-free. A local
user can exploit this to cause a denial of service (crash or
memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered a flaw in the interaction between ptrace and
seccomp subsystems. A process sandboxed using seccomp() but still
permitted to use ptrace() could exploit this to remove the seccomp
restrictions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-32250&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Aaron Adams discovered a use-after-free in Netfilter which may
result in local privilege escalation to root.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-33981&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yuan Ming from Tsinghua University reported a race condition in
the floppy driver involving use of the FDRAWCMD ioctl, which could
lead to a use-after-free. A local user with access to a floppy
drive device could exploit this to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
This ioctl is now disabled by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update also corrects a regression in the network scheduler
subsystem (bug #1013299).&lt;/p&gt;
&lt;p&gt;For the 32-bit Arm (armel and armhf) architectures, this update
enables optimised implementations of several cryptographic and CRC
algorithms.  For at least AES, this should remove a timing side-
channel that could lead to a leak of sensitive information.&lt;/p&gt;
&lt;p&gt;This update includes many more bug fixes from stable updates
4.19.236-4.19.249 inclusive, including for bug #1006346.  The random
driver has been backported from Linux 5.19, fixing numerous
performance and correctness issues.  Some changes will be visible:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;ul&gt;
&lt;li&gt;The entropy pool size is now 256 bits instead of 4096.  You may need
to adjust the configuration of system monitoring or user-space
entropy gathering services to allow for this.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;ul&gt;
&lt;li&gt;On systems without a hardware RNG, the kernel may log more uses of
/dev/urandom before it is fully initialised.  These uses were
previously under-counted and this is not a regression.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-632-2 apache2 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-632-2-apache2/</link>
      <pubDate>Sat, 23 Jul 2022 13:38:05 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-632-2-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-632-2-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u24 (jessie)&lt;/p&gt;


      &lt;p&gt;The patch for CVE-2022-31813 caused a regression in the apache2 package for
Debian 8 jessie, which resulted in some request parameters being lost in
&lt;code&gt;modproxy&lt;/code&gt; and &lt;code&gt;modproxy_http&lt;/code&gt; configurations.  This version corrects the
regression and implements the intended fix without request parameters being
lost.&lt;/p&gt;
&lt;p&gt;Note that this regression only affects the apache2 package for Debian 8 jessie.
The apache2 package for Debian 9 stretch which was published under the original
advisory ELA-632-1 is not affected by this regression.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-651-1 gsasl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-651-1-gsasl/</link>
      <pubDate>Sat, 23 Jul 2022 15:00:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-651-1-gsasl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-651-1-gsasl/">
      
&lt;p&gt;Package : gsasl&lt;/p&gt;


&lt;p&gt;Version : 1.8.0-6&amp;#43;deb8u1 (jessie), 1.8.0-8&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2469&#34;&gt;CVE-2022-2469&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Prevent a potential read-out-of-bounds vulnerability was discovered in gsasl, a
library for performing SASL authentication. The attack could have been
performed by a malicious (authenticated) GSS-API client.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-650-1 jetty8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-650-1-jetty8/</link>
      <pubDate>Fri, 22 Jul 2022 21:21:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-650-1-jetty8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-650-1-jetty8/">
      
&lt;p&gt;Package : jetty8&lt;/p&gt;


&lt;p&gt;Version : 8.1.16-4&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10247&#34;&gt;CVE-2019-10247&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27216&#34;&gt;CVE-2020-27216&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28169&#34;&gt;CVE-2021-28169&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Jetty 8, a Java
webserver and servlet engine.&lt;/p&gt;
&lt;p&gt;CVE-2019-10247&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The server running on any OS and Jetty version combination will reveal the
configured fully qualified directory base resource location on the output
of the 404 error for not finding a Context that matches the requested path.
The default server behavior on jetty-distribution and jetty-home will
include at the end of the Handler tree a DefaultHandler, which is
responsible for reporting this 404 error, it presents the various
configured contexts as HTML for users to click through to. This produced
HTML includes output that contains the configured fully qualified directory
base resource location for each context.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27216&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;On Unix like systems, the system&#39;s temporary directory is shared between
all users on that system. A collocated user can observe the process of
creating a temporary sub directory in the shared temporary directory and
race to complete the creation of the temporary subdirectory. If the
attacker wins the race then they will have read and write permission to the
subdirectory used to unpack web applications, including their WEB-INF/lib
jar files and JSP files. If any code is ever executed out of this temporary
directory, this can lead to a local privilege escalation vulnerability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It is possible for requests to the ConcatServlet with a doubly encoded path
to access protected resources within the WEB-INF directory. For example a
request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file.
This can reveal sensitive information regarding the implementation of a web
application.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-649-1 python-oslo.utils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-649-1-python-oslo.utils/</link>
      <pubDate>Wed, 20 Jul 2022 09:17:15 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-649-1-python-oslo.utils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-649-1-python-oslo.utils/">
      
&lt;p&gt;Package : python-oslo.utils&lt;/p&gt;


&lt;p&gt;Version : 3.16.0-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0718&#34;&gt;CVE-2022-0718&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Prevent exposure of sensitive admin passwords due to poor handling of
credential masking.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-648-1 ruby-rails-html-sanitizer security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-648-1-ruby-rails-html-sanitizer/</link>
      <pubDate>Wed, 20 Jul 2022 08:54:52 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-648-1-ruby-rails-html-sanitizer/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-648-1-ruby-rails-html-sanitizer/">
      
&lt;p&gt;Package : ruby-rails-html-sanitizer&lt;/p&gt;


&lt;p&gt;Version : 1.0.3-2&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-32209&#34;&gt;CVE-2022-32209&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential cross-site scripting (XSS) vulnerability was discovered in
&lt;code&gt;ruby-rails-html-sanitizer&lt;/code&gt;, a library to clean (or &amp;ldquo;sanitize&amp;rdquo;) HTML for
rendering within Ruby on Rails web applications.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-647-1 request-tracker4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-647-1-request-tracker4/</link>
      <pubDate>Mon, 18 Jul 2022 08:15:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-647-1-request-tracker4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-647-1-request-tracker4/">
      
&lt;p&gt;Package : request-tracker4&lt;/p&gt;


&lt;p&gt;Version : 4.2.8-3&amp;#43;deb8u4 (jessie), 4.4.1-3&amp;#43;deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38562&#34;&gt;CVE-2021-38562&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25802&#34;&gt;CVE-2022-25802&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system.&lt;/p&gt;
&lt;p&gt;CVE-2022-25802&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that Request Tracker is vulnerable to a cross-site
scripting (XSS) attack when displaying attachment content with fraudulent
content types.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Additionally it was discovered that Request Tracker did not perform full
rights checks on accesses to file or image type custom fields, possibly
allowing access to these custom fields by users without rights to access
to the associated objects, resulting in information disclosure.&lt;/p&gt;
&lt;p&gt;Furthermore the following vulnerability was addressed in Debian 8.&lt;/p&gt;
&lt;p&gt;CVE-2021-38562&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Sensitive information could have been revealed by way of a timing attack
 on the authentication system.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-646-1 python-babel security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-646-1-python-babel/</link>
      <pubDate>Sun, 17 Jul 2022 11:45:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-646-1-python-babel/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-646-1-python-babel/">
      
&lt;p&gt;Package : python-babel&lt;/p&gt;


&lt;p&gt;Version : 1.3&amp;#43;dfsg.1-5&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42771&#34;&gt;CVE-2021-42771&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An arbitrary code execution vulnerability was discovered in &lt;code&gt;python-babel&lt;/code&gt;, a
library for internationalizing Python applications.&lt;/p&gt;
&lt;p&gt;Attackers could load arbitrary locale &lt;code&gt;.data&lt;/code&gt; files (containing serialized
Python objects) via a directory traversal attack, leading to code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-645-1 pjproject security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-645-1-pjproject/</link>
      <pubDate>Fri, 15 Jul 2022 13:08:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-645-1-pjproject/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-645-1-pjproject/">
      
&lt;p&gt;Package : pjproject&lt;/p&gt;


&lt;p&gt;Version : 2.5.5~dfsg-6&amp;#43;deb9u6 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31031&#34;&gt;CVE-2022-31031&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There was a stack buffer overflow vulnerability in &lt;code&gt;pjproject&lt;/code&gt;, a multimedia
communication library used in various VOIP frameworks. &lt;code&gt;pjproject&lt;/code&gt; now
maintains a maximum attribute count to prevent this from happening.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-644-1 python-pysaml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-644-1-python-pysaml2/</link>
      <pubDate>Fri, 15 Jul 2022 10:14:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-644-1-python-pysaml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-644-1-python-pysaml2/">
      
&lt;p&gt;Package : python-pysaml2&lt;/p&gt;


&lt;p&gt;Version : 2.0.0-1&amp;#43;deb8u4 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21239&#34;&gt;CVE-2021-21239&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A certificate verification bypass vulnerability was discovered in
&lt;code&gt;python-pysaml2&lt;/code&gt;, a library for exchanging SAML authentication tokens.&lt;/p&gt;
&lt;p&gt;The default &lt;code&gt;CryptoBackendXmlSec1&lt;/code&gt; backend used the &lt;code&gt;xmlsec1&lt;/code&gt; binary to verify the
signature of signed SAML documents but, by default, &lt;code&gt;xmlsec1&lt;/code&gt; accepted any type
of key found within the given document; &lt;code&gt;xmlsec1&lt;/code&gt; actually needs to be
configured explicitly to only use only x509 certificates for the verification
process of the SAML document signature.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-643-1 ncurses security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-643-1-ncurses/</link>
      <pubDate>Thu, 14 Jul 2022 23:34:57 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-643-1-ncurses/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-643-1-ncurses/">
      
&lt;p&gt;Package : ncurses&lt;/p&gt;


&lt;p&gt;Version : 5.9&amp;#43;20140913-1&amp;#43;deb8u4 (jessie), 6.0&amp;#43;20161126-1&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19211&#34;&gt;CVE-2018-19211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17594&#34;&gt;CVE-2019-17594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17595&#34;&gt;CVE-2019-17595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29458&#34;&gt;CVE-2022-29458&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in ncurses, a shared libraries for terminal handling.
These issues are about out-of-bounds reads, missing checks for strange input and NULL pointer dereferencing in different parts of the library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-642-1 java-common new default java version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-642-1-java-common/</link>
      <pubDate>Thu, 14 Jul 2022 13:22:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-642-1-java-common/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-642-1-java-common/">
      
&lt;p&gt;Package : java-common&lt;/p&gt;


&lt;p&gt;Version : 0.52&amp;#43;deb8u1 (jessie)&lt;/p&gt;


      &lt;p&gt;This update changes the default Java packages to Java 8, with Java 7
no longer being supported. When both versions are installed, the
java binary still defaults to Java 7. That will be changed in the
next openjdk-8 update, and in the meanwhile can be changed using the
&lt;code&gt;update-alternatives --config java&lt;/code&gt; command, or by uninstalling the
Java 7 packages.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-641-1 strongswan security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-641-1-strongswan/</link>
      <pubDate>Thu, 14 Jul 2022 00:22:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-641-1-strongswan/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-641-1-strongswan/">
      
&lt;p&gt;Package : strongswan&lt;/p&gt;


&lt;p&gt;Version : 5.2.1-6&amp;#43;deb8u9 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41991&#34;&gt;CVE-2021-41991&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45079&#34;&gt;CVE-2021-45079&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2021-45079&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zhuowei Zhang discovered a bug in the EAP authentication client code of
strongSwan, an IKE/IPsec suite, that may allow to bypass the client and in
some scenarios even the server authentication, or could lead to a
denial-of-service attack.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41991&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Researchers at the United States of America National Security Agency (NSA)
identified a denial of service vulnerability in strongSwan.
Once the in-memory certificate cache is full it tries to randomly replace
lesser used entries. Depending on the generated random value, this could
lead to an integer overflow that results in a double-dereference and a call
using out-of-bounds memory that most likely leads to a segmentation fault.
Remote code execution can&#39;t be ruled out completely, but attackers have no
control over the dereferenced memory, so it seems unlikely at this point.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-640-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-640-1-python-django/</link>
      <pubDate>Wed, 13 Jul 2022 15:23:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-640-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-640-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1:1.10.7-2&amp;#43;deb9u18 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34265&#34;&gt;CVE-2022-34265&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A SQL injection vulnerability was discovered in Django, the popular web
development framework.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;Trunc()&lt;/code&gt; and &lt;code&gt;Extract()&lt;/code&gt; database functions were subject to SQL injection
if untrusted data is used as a &lt;code&gt;kind&lt;/code&gt; or &lt;code&gt;lookup_name&lt;/code&gt; value. Applications that
constrained the lookup name and kind choice to a &amp;ldquo;known&amp;rdquo;, fixed or otherwise
safe list were unaffected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-639-1 libjpeg-turbo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-639-1-libjpeg-turbo/</link>
      <pubDate>Tue, 12 Jul 2022 19:05:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-639-1-libjpeg-turbo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-639-1-libjpeg-turbo/">
      
&lt;p&gt;Package : libjpeg-turbo&lt;/p&gt;


&lt;p&gt;Version : 1:1.5.1-2&amp;#43;deb9u3 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46822&#34;&gt;CVE-2021-46822&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A heap-based buffer overflow vulnerability was found in the libjpeg-turbo image
library in the get_word_rgb_row() function in rdppm.c. This flaw allows a
remote attacker to persuade a victim to open a specially-crafted file, causing
the application to crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-638-1 ruby-sinatra security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-638-1-ruby-sinatra/</link>
      <pubDate>Tue, 12 Jul 2022 10:43:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-638-1-ruby-sinatra/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-638-1-ruby-sinatra/">
      
&lt;p&gt;Package : ruby-sinatra&lt;/p&gt;


&lt;p&gt;Version : 1.4.7-5&amp;#43;deb9u1 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29970&#34;&gt;CVE-2022-29970&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A file traversal vulnerability was discovered in &lt;code&gt;ruby-sinatra&lt;/code&gt;, a popular web
server often used with Ruby on Rails. We now validate that any expanded paths
match the allowed &lt;code&gt;public_dir&lt;/code&gt; when serving static files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-637-1 needrestart security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-637-1-needrestart/</link>
      <pubDate>Tue, 12 Jul 2022 10:02:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-637-1-needrestart/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-637-1-needrestart/">
      
&lt;p&gt;Package : needrestart&lt;/p&gt;


&lt;p&gt;Version : 1.2-8&amp;#43;deb8u2 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30688&#34;&gt;CVE-2022-30688&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jakub Wilk discovered a local privilege escalation in needrestart, a utility to
check which daemons need to be restarted after library upgrades. Regular
expressions to detect the Perl, Python, and Ruby interpreters are not anchored,
allowing a local user to escalate privileges when needrestart tries to detect
if interpreters are using old source files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-636-1 gnupg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-636-1-gnupg2/</link>
      <pubDate>Mon, 11 Jul 2022 16:09:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-636-1-gnupg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-636-1-gnupg2/">
      
&lt;p&gt;Package : gnupg2&lt;/p&gt;


&lt;p&gt;Version : 2.0.26-6&amp;#43;deb8u3 (jessie), 2.1.18-8~deb9u5 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9234&#34;&gt;CVE-2018-9234&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-34903&#34;&gt;CVE-2022-34903&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2022-34903&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Demi Marie Obenour discovered a flaw in GnuPG, allowing for signature
spoofing via arbitrary injection into the status line. An attacker who
controls the secret part of any signing-capable key or subkey in the
victim&#39;s keyring, can take advantage of this flaw to provide a
correctly-formed signature that some software, including gpgme, will
accept to have validity and signer fingerprint chosen from the attacker.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-9234&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;GnuPG does not enforce a configuration in which key certification requires an
offline master Certify key, which results in apparently valid certifications
that occurred only with access to a signing subkey.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-635-1 wireless-regdb new wireless regulatory database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-635-1-wireless-regdb/</link>
      <pubDate>Mon, 11 Jul 2022 14:12:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-635-1-wireless-regdb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-635-1-wireless-regdb/">
      
&lt;p&gt;Package : wireless-regdb&lt;/p&gt;


&lt;p&gt;Version : 2022.04.08-1~deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;This update includes the latest changes to the wireless regulatory database.
In addition, it allows the Linux 5.10 kernel to verify and autoload it.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-634-1 linux-5.10 new kernel version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-634-1-linux-5.10/</link>
      <pubDate>Mon, 11 Jul 2022 13:44:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-634-1-linux-5.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-634-1-linux-5.10/">
      
&lt;p&gt;Package : linux-5.10&lt;/p&gt;


&lt;p&gt;Version : 5.10.120-1~deb9u1 (stretch)&lt;/p&gt;


      &lt;p&gt;This update introduces Linux kernel 5.10 to Debian 9 stretch. This kernel will be
supported along with 4.19, but for a longer period. Linux 4.9 is no longer supported.
Instructions on how to update to 5.10 and support periods can be found
&lt;a href=&#34;https://www.freexian.com/docs/kernel-backport&#34;&gt;in the kernel backports page&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-633-1 linux-4.19 new kernel version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-633-1-linux-4.19/</link>
      <pubDate>Mon, 11 Jul 2022 12:51:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-633-1-linux-4.19/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-633-1-linux-4.19/">
      
&lt;p&gt;Package : linux-4.19&lt;/p&gt;


&lt;p&gt;Version : 4.19.232-1~deb8u1 (jessie)&lt;/p&gt;


      &lt;p&gt;This update introduces Linux kernel 4.19 to Debian 8 jessie. Previous
kernels 3.16 and 4.9 are no longer supported. Instructions on how to
update to 4.19 can be found &lt;a href=&#34;https://www.freexian.com/docs/kernel-backport&#34;&gt;in the kernel backports page&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-632-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-632-1-apache2/</link>
      <pubDate>Mon, 04 Jul 2022 15:10:29 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-632-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-632-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u23 (jessie), 2.4.25-3&amp;#43;deb9u14 (stretch)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26377&#34;&gt;CVE-2022-26377&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28614&#34;&gt;CVE-2022-28614&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28615&#34;&gt;CVE-2022-28615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29404&#34;&gt;CVE-2022-29404&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30522&#34;&gt;CVE-2022-30522&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-30556&#34;&gt;CVE-2022-30556&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31813&#34;&gt;CVE-2022-31813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found in the Apache HTTP server:&lt;/p&gt;
&lt;p&gt;CVE-2022-26377&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Inconsistent Interpretation of HTTP Requests (&#39;HTTP Request
Smuggling&#39;) vulnerability in mod_proxy_ajp of Apache HTTP Server
allows an attacker to smuggle requests to the AJP server it forwards
requests to.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28614&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The ap_rwrite() function read unintended memory if an attacker can
cause the server to reflect very large input using ap_rwrite() or
ap_rputs(), such as with mod_luas r:puts() function. Modules
compiled and distributed separately from Apache HTTP Server that use
the &#39;ap_rputs&#39; function and may pass it a very large (INT_MAX or
larger) string must be compiled against current headers to resolve
the issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-28615&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache HTTP Server may crash or disclose information due to a read
beyond bounds in ap_strcmp_match() when provided with an extremely
large input buffer.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-29404&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Apache HTTP Server, a malicious request to a lua script that
calls r:parsebody(0) may cause a denial of service due to no default
limit on possible input size.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30522&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If Apache HTTP Server is configured to do transformations with
mod_sed in contexts where the input to mod_sed may be very large,
mod_sed may make excessively large memory allocations and trigger an
abort.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-30556&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache HTTP Server may return lengths to applications calling
r:wsread() that point past the end of the storage allocated for the
buffer.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-31813&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache HTTP Server may not send the X-Forwarded-* headers to the
origin server based on client side Connection header hop-by-hop
mechanism. This may be used to bypass IP based authentication on the
origin server/application.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-631-1 dpkg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-631-1-dpkg/</link>
      <pubDate>Sun, 03 Jul 2022 17:20:53 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-631-1-dpkg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-631-1-dpkg/">
      
&lt;p&gt;Package : dpkg&lt;/p&gt;


&lt;p&gt;Version : 1.17.28 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1664&#34;&gt;CVE-2022-1664&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Max Justicz reported a directory traversal vulnerability in
Dpkg::Source::Archive in dpkg, the Debian package management system.
This affects extracting untrusted source packages in the v2 and v3
source package formats that include a debian.tar.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-630-1 maven-shared-utils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-630-1-maven-shared-utils/</link>
      <pubDate>Mon, 27 Jun 2022 13:08:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-630-1-maven-shared-utils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-630-1-maven-shared-utils/">
      
&lt;p&gt;Package : maven-shared-utils&lt;/p&gt;


&lt;p&gt;Version : 0.4-1&amp;#43;deb8u1 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29599&#34;&gt;CVE-2022-29599&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the Commandline class in maven-shared-utils, a
collection of various utility classes for the Maven build system, can emit
double-quoted strings without proper escaping, allowing shell injection
attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-629-1 libsndfile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-629-1-libsndfile/</link>
      <pubDate>Sun, 26 Jun 2022 13:29:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-629-1-libsndfile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-629-1-libsndfile/">
      
&lt;p&gt;Package : libsndfile&lt;/p&gt;


&lt;p&gt;Version : 1.0.25-9.1&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4156&#34;&gt;CVE-2021-4156&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libsndfile, a library for reading/writing
audio files.
Using a crafted FLAC file, an attacker could trigger an out-of-bounds
read that would most likely cause a crash but could potentially leak
memory information.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-628-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-628-1-vim/</link>
      <pubDate>Wed, 22 Jun 2022 10:45:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-628-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-628-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u7 (jessie)&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3903&#34;&gt;CVE-2021-3903&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0417&#34;&gt;CVE-2022-0417&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0943&#34;&gt;CVE-2022-0943&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1851&#34;&gt;CVE-2022-1851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1898&#34;&gt;CVE-2022-1898&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1968&#34;&gt;CVE-2022-1968&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2124&#34;&gt;CVE-2022-2124&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-2126&#34;&gt;CVE-2022-2126&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in vim, an enhanced vi
editor. Buffer overflows, out-of-bounds reads and use-after-free may lead to a
denial-of-service (application crash) or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-627-1 tzdata new timezone database</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-627-1-tzdata/</link>
      <pubDate>Thu, 16 Jun 2022 11:32:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-627-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-627-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u4&lt;/p&gt;


      &lt;p&gt;This update includes the latest changes to the leap second list,
including an update to its expiry date, which was set for the end of
June.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-626-1 haproxy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-626-1-haproxy/</link>
      <pubDate>Wed, 15 Jun 2022 01:04:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-626-1-haproxy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-626-1-haproxy/">
      
&lt;p&gt;Package : haproxy&lt;/p&gt;


&lt;p&gt;Version : 1.5.8-3&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18277&#34;&gt;CVE-2019-18277&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Nathan Davison discovered that HAProxy, a load balancing reverse proxy, did not
correctly reject requests or responses featuring a transfer-encoding header
missing the &amp;ldquo;chunked&amp;rdquo; value which could facilitate a HTTP request smuggling
attack.&lt;/p&gt;
&lt;p&gt;Furthermore two issues have been addressed which never received a final CVE.
There was a risk of reading past the end of a buffer in src/proto_http.c. This
could lead to a denial of service (segmentation fault and application crash)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-625-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-625-1-glib2.0/</link>
      <pubDate>Tue, 14 Jun 2022 13:39:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-625-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-625-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.42.1-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27218&#34;&gt;CVE-2021-27218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27219&#34;&gt;CVE-2021-27219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28153&#34;&gt;CVE-2021-28153&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found in glib2.0, a general-purpose
utility library for the GNOME environment.&lt;/p&gt;
&lt;p&gt;CVE-2021-27218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If g_byte_array_new_take() was called with a buffer of 4GB or more on a
64-bit platform, the length would be truncated modulo 2**32, causing
unintended length truncation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-27219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The function g_bytes_new has an integer overflow on 64-bit platforms due to
an implicit cast from 64 bits to 32 bits. The overflow could potentially
lead to memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28153&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to
replace a path that is a dangling symlink, it incorrectly also creates the
target of the symlink as an empty file, which could conceivably have
security relevance if the symlink is attacker-controlled. (If the path is
a symlink to a file that already exists, then the contents of that file
correctly remain unchanged.)
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-624-1 avahi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-624-1-avahi/</link>
      <pubDate>Tue, 14 Jun 2022 13:35:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-624-1-avahi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-624-1-avahi/">
      
&lt;p&gt;Package : avahi&lt;/p&gt;


&lt;p&gt;Version : 0.6.31-5&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3468&#34;&gt;CVE-2021-3468&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26720&#34;&gt;CVE-2021-26720&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the Debian package of Avahi, a framework for Multicast
DNS Service Discovery, executed the script avahi-daemon-check-dns.sh with root
privileges which would allow a local attacker to cause a denial of service or
create arbitrary empty files via a symlink attack on files under
/var/run/avahi-daemon. This script is now executed with the privileges of user
and group avahi and requires sudo in order to achieve that.&lt;/p&gt;
&lt;p&gt;Furthermore it was found (CVE-2021-3468) that the event used to signal the
termination of the client connection on the avahi Unix socket is not correctly
handled in the client_work function, allowing a local attacker to trigger an
infinite loop.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-623-1 python-bottle security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-623-1-python-bottle/</link>
      <pubDate>Thu, 09 Jun 2022 01:18:08 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-623-1-python-bottle/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-623-1-python-bottle/">
      
&lt;p&gt;Package : python-bottle&lt;/p&gt;


&lt;p&gt;Version : 0.12.7-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-31799&#34;&gt;CVE-2022-31799&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Bottle, which is a fast, simple and lightweight WSGI micro
web-framework for Pytho, mishandles errors during early request
binding.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-622-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-622-1-clamav/</link>
      <pubDate>Mon, 06 Jun 2022 17:11:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-622-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-622-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.103.6&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20770&#34;&gt;CVE-2022-20770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20771&#34;&gt;CVE-2022-20771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20785&#34;&gt;CVE-2022-20785&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20792&#34;&gt;CVE-2022-20792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-20796&#34;&gt;CVE-2022-20796&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in the ClamAV antivirus toolkit,
that could result in denial of service or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-621-1 beep security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-621-1-beep/</link>
      <pubDate>Sat, 04 Jun 2022 02:08:01 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-621-1-beep/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-621-1-beep/">
      
&lt;p&gt;Package : beep&lt;/p&gt;


&lt;p&gt;Version : 1.3-3&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000532&#34;&gt;CVE-2018-1000532&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;beep, an advanced PC-speaker beeper, contains a External Control of
File Name or Path vulnerability in &amp;ndash;device option that can result
in Local unprivileged user can inhibit execution of arbitrary programs
by other users, allowing DoS. This attack appear to be exploitable
via The system must allow local users to run beep.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-620-1 libdbi-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-620-1-libdbi-perl/</link>
      <pubDate>Mon, 30 May 2022 21:50:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-620-1-libdbi-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-620-1-libdbi-perl/">
      
&lt;p&gt;Package : libdbi-perl&lt;/p&gt;


&lt;p&gt;Version : 1.631-3&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-10402&#34;&gt;CVE-2014-10402&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that CVE-2014-10401 was fixed incompletely in the
Perl5 Database Interface (DBI).  An attacker could trigger information
disclosure through a different vector.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2014-10401&lt;/p&gt;
&lt;p&gt;DBD::File drivers can open files from folders other than those
specifically passed via the f_dir attribute.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2014-10402&lt;/p&gt;
&lt;p&gt;DBD::File drivers can open files from folders other than those
specifically passed via the f_dir attribute in the data source
name (DSN). NOTE: this issue exists because of an incomplete fix
for CVE-2014-10401.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-619-1 modsecurity-apache security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-619-1-modsecurity-apache/</link>
      <pubDate>Sat, 28 May 2022 09:00:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-619-1-modsecurity-apache/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-619-1-modsecurity-apache/">
      
&lt;p&gt;Package : modsecurity-apache&lt;/p&gt;


&lt;p&gt;Version : 2.8.0-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42717&#34;&gt;CVE-2021-42717&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential resource exhaustion attack in
&lt;code&gt;modsecurity-apache&lt;/code&gt;, an Apache module which inspects HTTP requests with the
aim of preventing typical web application attacks such as XSS and SQL.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-618-1 openldap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-618-1-openldap/</link>
      <pubDate>Fri, 27 May 2022 01:15:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-618-1-openldap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-618-1-openldap/">
      
&lt;p&gt;Package : openldap&lt;/p&gt;


&lt;p&gt;Version : 2.4.40&amp;#43;dfsg-1&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29155&#34;&gt;CVE-2022-29155&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jacek Konieczny discovered a SQL injection vulnerability in the back-sql
backend to slapd in OpenLDAP, a free implementation of the Lightweight
Directory Access Protocol, allowing an attacker to alter the database
during an LDAP search operations when a specially crafted search filter
is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-617-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-617-1-libxml2/</link>
      <pubDate>Wed, 18 May 2022 22:18:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-617-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-617-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29824&#34;&gt;CVE-2022-29824&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Felix Wilhelm discovered that libxml2, the GNOME XML library, did not correctly
check for integer overflows or used wrong types for buffer sizes. This could
result in out-of-bounds writes or other memory errors when working on large,
multi-gigabyte buffers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-616-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-616-1-vim/</link>
      <pubDate>Wed, 18 May 2022 16:32:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-616-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-616-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0261&#34;&gt;CVE-2022-0261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0351&#34;&gt;CVE-2022-0351&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0413&#34;&gt;CVE-2022-0413&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0443&#34;&gt;CVE-2022-0443&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0572&#34;&gt;CVE-2022-0572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1154&#34;&gt;CVE-2022-1154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1616&#34;&gt;CVE-2022-1616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1619&#34;&gt;CVE-2022-1619&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1621&#34;&gt;CVE-2022-1621&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1720&#34;&gt;CVE-2022-1720&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in vim, an enhanced
vi editor. Buffer overflows, out-of-bounds reads and use-after-free may
lead to a denial-of-service (application crash) or other unspecified
impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-615-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-615-1-openjpeg2/</link>
      <pubDate>Tue, 17 May 2022 21:39:18 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-615-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-615-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-2&amp;#43;deb8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1122&#34;&gt;CVE-2022-1122&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in the &lt;code&gt;opj2_decompress&lt;/code&gt; program in &lt;code&gt;openjpeg2&lt;/code&gt; in the
way it handles an input directory with a large number of files.
When it fails to allocate a buffer to store the filenames of the input
directory, it calls &lt;code&gt;free()&lt;/code&gt; on an uninitialized pointer, leading to a
segmentation fault and a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-614-1 cifs-utils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-614-1-cifs-utils/</link>
      <pubDate>Mon, 16 May 2022 19:16:35 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-614-1-cifs-utils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-614-1-cifs-utils/">
      
&lt;p&gt;Package : cifs-utils&lt;/p&gt;


&lt;p&gt;Version : 2:6.4-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27239&#34;&gt;CVE-2022-27239&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-29869&#34;&gt;CVE-2022-29869&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A couple of vulnerabilities were found in src:cifs-utils, a Common
Internet File System utilities, and are as follows:&lt;/p&gt;
&lt;p&gt;CVE-2022-27239&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In cifs-utils, a stack-based buffer overflow when parsing the
mount.cifs ip= command-line argument could lead to local attackers
gaining root privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-29869&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;cifs-utils, with verbose logging, can cause an information leak
when a file contains = (equal sign) characters but is not a valid
credentials file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-613-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-613-1-openssl/</link>
      <pubDate>Mon, 16 May 2022 08:08:29 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-613-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-613-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1292&#34;&gt;CVE-2022-1292&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The &lt;code&gt;c_rehash&lt;/code&gt; script does not properly sanitise shell metacharacters to
prevent command injection. This script is executed by
&lt;code&gt;update-ca-certificates&lt;/code&gt;, from &lt;code&gt;ca-certificates&lt;/code&gt;, to re-hash
certificates in &lt;code&gt;/etc/ssl/certs/&lt;/code&gt;. An attacker able to place files in
this directory could execute arbitrary commands with the privileges of
the script.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-612-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-612-1-openjdk-8/</link>
      <pubDate>Sat, 14 May 2022 11:25:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-612-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-612-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u332-ga-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21426&#34;&gt;CVE-2022-21426&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21434&#34;&gt;CVE-2022-21434&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21443&#34;&gt;CVE-2022-21443&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21476&#34;&gt;CVE-2022-21476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21496&#34;&gt;CVE-2022-21496&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in information disclosure or denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-611-1 libgoogle-gson-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-611-1-libgoogle-gson-java/</link>
      <pubDate>Sat, 14 May 2022 03:12:59 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-611-1-libgoogle-gson-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-611-1-libgoogle-gson-java/">
      
&lt;p&gt;Package : libgoogle-gson-java&lt;/p&gt;


&lt;p&gt;Version : 2.2.4-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25647&#34;&gt;CVE-2022-25647&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;src:libgoogle-gson-java, which helps convert Java objects into their JSON
representation, is vulnerable to Deserialization of Untrusted Data via
the writeReplace() method in internal classes, which may lead to DoS attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-610-1 htmldoc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-610-1-htmldoc/</link>
      <pubDate>Fri, 13 May 2022 12:59:19 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-610-1-htmldoc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-610-1-htmldoc/">
      
&lt;p&gt;Package : htmldoc&lt;/p&gt;


&lt;p&gt;Version : 1.8.27-8&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-27114&#34;&gt;CVE-2022-27114&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an integer overflow vulnerability in htmldoc,
a HTML processor that generates indexed HTML, PS and PDF files. This was caused
by a programming error in the &lt;code&gt;image_load_jpeg&lt;/code&gt; function due to a conflation or
confusion of declared/expected/observed image dimensions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-609-1 ruby-nokogiri security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-609-1-ruby-nokogiri/</link>
      <pubDate>Fri, 13 May 2022 10:39:16 -0700</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-609-1-ruby-nokogiri/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-609-1-ruby-nokogiri/">
      
&lt;p&gt;Package : ruby-nokogiri&lt;/p&gt;


&lt;p&gt;Version : 1.6.3.1&amp;#43;ds-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24836&#34;&gt;CVE-2022-24836&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential denial of service attack in
ruby-nokogiri, a HTML, XML, SAX etc. parser written in/for the Ruby programming
language. This was caused by the use of inefficient regular expressions that
were susceptible to excessive backtracking.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-608-1 lrzip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-608-1-lrzip/</link>
      <pubDate>Fri, 13 May 2022 20:49:28 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-608-1-lrzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-608-1-lrzip/">
      
&lt;p&gt;Package : lrzip&lt;/p&gt;


&lt;p&gt;Version : 0.616-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-28044&#34;&gt;CVE-2022-28044&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;src:lrzip, a compression program with a very high compression
ratio, was discovered to contain a heap memory corruption via
the component lrzip.c:initialise_control.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-607-1 mutt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-607-1-mutt/</link>
      <pubDate>Fri, 13 May 2022 04:56:35 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-607-1-mutt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-607-1-mutt/">
      
&lt;p&gt;Package : mutt&lt;/p&gt;


&lt;p&gt;Version : 1.5.23-3&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1328&#34;&gt;CVE-2022-1328&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Mutt, a text-based mailreader supporting MIME,
GPG, PGP and threading, incorrectly handled certain input. An attacker
could possibly use this issue to cause a crash, or expose sensitive
information.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-606-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-606-1-ghostscript/</link>
      <pubDate>Mon, 09 May 2022 09:56:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-606-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-606-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25059&#34;&gt;CVE-2019-25059&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A security vulnerability was found in Ghostscript, the GPL PostScript/PDF
interpreter. It was discovered that some privileged Postscript operators
remained accessible from various places. For instance a specially crafted
PostScript file could use this flaw in order to have access to the file
system outside of the constrains imposed by -dSAFER.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-605-1 jackson-databind security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-605-1-jackson-databind/</link>
      <pubDate>Tue, 03 May 2022 15:32:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-605-1-jackson-databind/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-605-1-jackson-databind/">
      
&lt;p&gt;Package : jackson-databind&lt;/p&gt;


&lt;p&gt;Version : 2.4.2-2&amp;#43;deb8u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36518&#34;&gt;CVE-2020-36518&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the implementation of UntypedObjectDeserializer in
jackson-databind, a fast and powerful JSON library for Java, was prone to a
denial of service attack when deeply nested object and array values were
processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-604-1 twisted security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-604-1-twisted/</link>
      <pubDate>Sun, 01 May 2022 15:35:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-604-1-twisted/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-604-1-twisted/">
      
&lt;p&gt;Package : twisted&lt;/p&gt;


&lt;p&gt;Version : 14.0.2-3&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24801&#34;&gt;CVE-2022-24801&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Twisted is an event-based Python framework for internet applications. The
Twisted Web HTTP 1.1 server parsed several HTTP request constructs more
leniently than permitted by RFC 7230. This non-conformant parsing can lead to
desync if requests pass through multiple HTTP parsers, potentially resulting in
HTTP request smuggling.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-603-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-603-1-libarchive/</link>
      <pubDate>Sat, 30 Apr 2022 16:50:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-603-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-603-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.1.2-11&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19221&#34;&gt;CVE-2019-19221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23177&#34;&gt;CVE-2021-23177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31566&#34;&gt;CVE-2021-31566&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Three issues have been found in libarchive, a multi-format archive and compression library.&lt;/p&gt;
&lt;p&gt;CVE-2021-31566
symbolic links incorrectly followed when changing modes, times, ACL
and flags of a file while extracting an archive&lt;/p&gt;
&lt;p&gt;CVE-2021-23177
extracting a symlink with ACLs modifies ACLs of target&lt;/p&gt;
&lt;p&gt;CVE-2019-19221
out-of-bounds read because of an incorrect mbrtowc or mbtowc call&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-602-1 tinyxml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-602-1-tinyxml/</link>
      <pubDate>Sat, 30 Apr 2022 16:46:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-602-1-tinyxml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-602-1-tinyxml/">
      
&lt;p&gt;Package : tinyxml&lt;/p&gt;


&lt;p&gt;Version : 2.6.2-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42260&#34;&gt;CVE-2021-42260&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in tinyxml, a C++ XML parsing library.
Crafted XML messages could lead to an infinite loop in
TiXmlParsingData::Stamp(), which results in a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-601-1 openvpn security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-601-1-openvpn/</link>
      <pubDate>Thu, 28 Apr 2022 14:10:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-601-1-openvpn/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-601-1-openvpn/">
      
&lt;p&gt;Package : openvpn&lt;/p&gt;


&lt;p&gt;Version : 2.3.4-5&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12166&#34;&gt;CVE-2017-12166&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15078&#34;&gt;CVE-2020-15078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0547&#34;&gt;CVE-2022-0547&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues were discovered in OpenVPN, a Virtual Private Network server
and client, that could lead to authentication bypass when using deferred
auth plugins.&lt;/p&gt;
&lt;p&gt;Note that this upload disables support for multiple deferred auth plugins,
following the upstream fix for CVE-2022-0547.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-600-1 golang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-600-1-golang/</link>
      <pubDate>Thu, 28 Apr 2022 11:36:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-600-1-golang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-600-1-golang/">
      
&lt;p&gt;Package : golang&lt;/p&gt;


&lt;p&gt;Version : 2:1.3.3-1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23806&#34;&gt;CVE-2022-23806&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In the Go programming language, Curve.IsOnCurve in crypto/elliptic can
incorrectly return true in situations with a big.Int value that is not
a valid field element. Operating on those values may cause a panic or
an invalid curve operation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-599-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-599-1-bind9/</link>
      <pubDate>Wed, 20 Apr 2022 16:06:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-599-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-599-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u27&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25220&#34;&gt;CVE-2021-25220&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that bind9, an internet domain name server, was vulnerable to
cache poisoning. When using forwarders, bogus NS records supplied by, or via,
those forwarders may be cached and used by named if it needs to recurse for any
reason, causing it to obtain and pass on potentially incorrect answers.&lt;/p&gt;
&lt;p&gt;This update corrects the regression in the isc-dhcp package. [ELA-584-2]&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-598-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-598-1-python2.7/</link>
      <pubDate>Thu, 14 Apr 2022 20:28:05 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-598-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-598-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1-1&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16935&#34;&gt;CVE-2019-16935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3177&#34;&gt;CVE-2021-3177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4189&#34;&gt;CVE-2021-4189&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in src:python2.7, the Python interpreter.&lt;/p&gt;
&lt;p&gt;CVE-2019-16935&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The documentation XML-RPC server in Python has XSS via the server_title
field. This occurs in Lib/DocXMLRPCServer.py. If set_server_title is called
with untrusted input, arbitrary JavaScript can be delivered to clients that
visit the http URL for this server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3177&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Python has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which
may lead to remote code execution in certain Python applications that
accept floating-point numbers as untrusted input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-4189&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in Python, specifically in the FTP (File Transfer Protocol)
client library when using it in PASV (passive) mode. The flaw lies in how
the FTP client trusts the host from PASV response by default. An attacker
could use this flaw to setup a malicious FTP server that can trick FTP
clients into connecting back to a given IP address and port. This could lead
to FTP client scanning ports which otherwise would not have been possible.
.
Instead of using the returned address, ftplib now uses the IP address we&#39;re
already connected to. For the rare user who wants an old behavior, set a
`trust_server_pasv_ipv4_address` attribute on your `ftplib.FTP` instance to
True.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-597-1 lrzip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-597-1-lrzip/</link>
      <pubDate>Wed, 13 Apr 2022 15:00:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-597-1-lrzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-597-1-lrzip/">
      
&lt;p&gt;Package : lrzip&lt;/p&gt;


&lt;p&gt;Version : 0.616-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8842&#34;&gt;CVE-2017-8842&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8843&#34;&gt;CVE-2017-8843&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8844&#34;&gt;CVE-2017-8844&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8845&#34;&gt;CVE-2017-8845&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8846&#34;&gt;CVE-2017-8846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8847&#34;&gt;CVE-2017-8847&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9928&#34;&gt;CVE-2017-9928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9929&#34;&gt;CVE-2017-9929&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5650&#34;&gt;CVE-2018-5650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5747&#34;&gt;CVE-2018-5747&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5786&#34;&gt;CVE-2018-5786&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9058&#34;&gt;CVE-2018-9058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10685&#34;&gt;CVE-2018-10685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11496&#34;&gt;CVE-2018-11496&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25467&#34;&gt;CVE-2020-25467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27345&#34;&gt;CVE-2021-27345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27347&#34;&gt;CVE-2021-27347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26291&#34;&gt;CVE-2022-26291&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in lrzip, a
compression program. Heap-based and stack buffer overflows,
use-after-free and infinite loops would allow attackers to cause a
denial of service or possibly other unspecified impact via a crafted
compressed file.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-8842&lt;/p&gt;
&lt;p&gt;The bufRead::get() function in libzpaq/libzpaq.h allows remote
attackers to cause a denial of service (divide-by-zero error and
application crash) via a crafted archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-8843&lt;/p&gt;
&lt;p&gt;The join_pthread function in stream.c allows remote attackers to
cause a denial of service (NULL pointer dereference and
application crash) via a crafted archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-8844&lt;/p&gt;
&lt;p&gt;The read_1g function in stream.c allows remote attackers to cause
a denial of service (heap-based buffer overflow and application
crash) or possibly have unspecified other impact via a crafted
archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-8845&lt;/p&gt;
&lt;p&gt;The lzo1x_decompress function in lzo1x_d.ch in LZO, as used in
lrzip, allows remote attackers to cause a denial of service
(invalid memory read and application crash) via a crafted archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-8846&lt;/p&gt;
&lt;p&gt;The read_stream function in stream.c allows remote attackers to
cause a denial of service (use-after-free and application crash)
via a crafted archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-8847&lt;/p&gt;
&lt;p&gt;The bufRead::get() function in libzpaq/libzpaq.h allows remote
attackers to cause a denial of service (NULL pointer dereference
and application crash) via a crafted archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-9928&lt;/p&gt;
&lt;p&gt;A stack buffer overflow was found in the function get_fileinfo,
which allows attackers to cause a denial of service via a crafted
file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-9929&lt;/p&gt;
&lt;p&gt;A stack buffer overflow was found in the function get_fileinfo,
which allows attackers to cause a denial of service via a crafted
file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-5650&lt;/p&gt;
&lt;p&gt;There is an infinite loop and application hang in the unzip_match
function in runzip.c. Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted lrz file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-5747&lt;/p&gt;
&lt;p&gt;There is a use-after-free in the ucompthread function
(stream.c). Remote attackers could leverage this vulnerability to
cause a denial of service via a crafted lrz file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-5786&lt;/p&gt;
&lt;p&gt;There is an infinite loop and application hang in the get_fileinfo
function (lrzip.c). Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted lrz file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-9058&lt;/p&gt;
&lt;p&gt;There is an infinite loop in the runzip_fd function of
runzip.c. Remote attackers could leverage this vulnerability to
cause a denial of service via a crafted lrz file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-10685&lt;/p&gt;
&lt;p&gt;There is a use-after-free in the lzma_decompress_buf function of
stream.c, which allows remote attackers to cause a denial of
service (application crash) or possibly have unspecified other
impact.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-11496&lt;/p&gt;
&lt;p&gt;There is a use-after-free in read_stream in stream.c, because
decompress_file in lrzip.c lacks certain size validation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25467&lt;/p&gt;
&lt;p&gt;A null pointer dereference was discovered lzo_decompress_buf in
stream.c which allows an attacker to cause a denial of service
(DOS) via a crafted compressed file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-27345&lt;/p&gt;
&lt;p&gt;A null pointer dereference was discovered in ucompthread in
stream.c which allows attackers to cause a denial of service (DOS)
via a crafted compressed file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-27347&lt;/p&gt;
&lt;p&gt;Use after free in lzma_decompress_buf function in stream.c in
allows attackers to cause Denial of Service (DoS) via a crafted
compressed file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-26291&lt;/p&gt;
&lt;p&gt;lrzip was discovered to contain a multiple concurrency
use-after-free between the functions zpaq_decompress_buf() and
clear_rulist(). This vulnerability allows attackers to cause a
Denial of Service (DoS) via a crafted lrz file.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-596-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-596-1-openjpeg2/</link>
      <pubDate>Tue, 12 Apr 2022 21:48:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-596-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-596-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-2&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27842&#34;&gt;CVE-2020-27842&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27843&#34;&gt;CVE-2020-27843&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29338&#34;&gt;CVE-2021-29338&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in openjpeg2, the open-source
JPEG 2000 codec.&lt;/p&gt;
&lt;p&gt;CVE-2020-27842&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Null pointer dereference through specially crafted input. The highest impact
of this flaw is to application availability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27843&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The flaw allows an attacker to provide specially crafted input to the
conversion or encoding functionality, causing an out-of-bounds read. The
highest threat from this vulnerability is system availability.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29338&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow allows remote attackers to crash the application, causing a
denial of service. This occurs when the attacker uses the command line
option &amp;quot;-ImgDir&amp;quot; on a directory that contains 1048576 files.&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-595-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-595-1-zabbix/</link>
      <pubDate>Mon, 11 Apr 2022 00:26:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-595-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-595-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24349&#34;&gt;CVE-2022-24349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24917&#34;&gt;CVE-2022-24917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24919&#34;&gt;CVE-2022-24919&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in zabbix, a network
monitoring solution. An authenticated user can create a link with reflected
Javascript code inside it for graphs and actions pages and send it to other
users. The payload can be executed only with a known CSRF token value of the
victim, which is changed periodically and is difficult to predict.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-594-1 xz-utils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-594-1-xz-utils/</link>
      <pubDate>Sun, 10 Apr 2022 18:46:15 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-594-1-xz-utils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-594-1-xz-utils/">
      
&lt;p&gt;Package : xz-utils&lt;/p&gt;


&lt;p&gt;Version : 5.1.1alpha&amp;#43;20120614-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1271&#34;&gt;CVE-2022-1271&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An arbitrary-file-write vulnerability was discovered in xz-utils,
which provides XZ-format compression utilities.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-593-1 gzip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-593-1-gzip/</link>
      <pubDate>Sun, 10 Apr 2022 18:42:35 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-593-1-gzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-593-1-gzip/">
      
&lt;p&gt;Package : gzip&lt;/p&gt;


&lt;p&gt;Version : 1.6-4&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-1271&#34;&gt;CVE-2022-1271&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An arbitrary-file-write vulnerability was discovered in gzip, which
provides GNU compression utilities.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-592-1 fribidi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-592-1-fribidi/</link>
      <pubDate>Sun, 10 Apr 2022 12:30:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-592-1-fribidi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-592-1-fribidi/">
      
&lt;p&gt;Package : fribidi&lt;/p&gt;


&lt;p&gt;Version : 0.19.6-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25308&#34;&gt;CVE-2022-25308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25309&#34;&gt;CVE-2022-25309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25310&#34;&gt;CVE-2022-25310&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in fribidi, a free Implementation of the Unicode BiDi algorithm.
The issues are related to stack-buffer-overflow, heap-buffer-overflow, and a SEGV.&lt;/p&gt;
&lt;p&gt;CVE-2022-25308
stack-buffer-overflow issue in main()&lt;/p&gt;
&lt;p&gt;CVE-2022-25309
heap-buffer-overflow issue in fribidi_cap_rtl_to_unicode()&lt;/p&gt;
&lt;p&gt;CVE-2022-25310
SEGV issue in fribidi_remove_bidi_marks()&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-591-1 minidlna security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-591-1-minidlna/</link>
      <pubDate>Sun, 10 Apr 2022 00:26:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-591-1-minidlna/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-591-1-minidlna/">
      
&lt;p&gt;Package : minidlna&lt;/p&gt;


&lt;p&gt;Version : 1.1.2&amp;#43;dfsg-1.1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-26505&#34;&gt;CVE-2022-26505&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Validate HTTP requests to protect against DNS rebinding, thus forbid a remote web server to exfiltrate media files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-590-1 zlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-590-1-zlib/</link>
      <pubDate>Sun, 03 Apr 2022 10:28:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-590-1-zlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-590-1-zlib/">
      
&lt;p&gt;Package : zlib&lt;/p&gt;


&lt;p&gt;Version : 1:1.2.8.dfsg-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25032&#34;&gt;CVE-2018-25032&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Danilo Ramos discovered that incorrect memory handling in zlib&amp;rsquo;s deflate
handling could result in denial of service or potentially the execution
of arbitrary code if specially crafted input is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-589-1 libgc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-589-1-libgc/</link>
      <pubDate>Wed, 30 Mar 2022 23:24:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-589-1-libgc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-589-1-libgc/">
      
&lt;p&gt;Package : libgc&lt;/p&gt;


&lt;p&gt;Version : 1:7.2d-6.4&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9427&#34;&gt;CVE-2016-9427&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;libgc, a conservative garbage collector, is vulnerable to integer
overflows in multiple places. In some cases, when asked to allocate a huge
quantity of memory, instead of failing the request, it will return a
pointer to a small amount of memory possibly tricking the application into
a buffer overwrite.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-588-1 cacti security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-588-1-cacti/</link>
      <pubDate>Tue, 29 Mar 2022 23:12:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-588-1-cacti/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-588-1-cacti/">
      
&lt;p&gt;Package : cacti&lt;/p&gt;


&lt;p&gt;Version : 0.8.8b&amp;#43;dfsg-8&amp;#43;deb8u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10060&#34;&gt;CVE-2018-10060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10061&#34;&gt;CVE-2018-10061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13230&#34;&gt;CVE-2020-13230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-23226&#34;&gt;CVE-2020-23226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23225&#34;&gt;CVE-2021-23225&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0730&#34;&gt;CVE-2022-0730&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Cacti, a web interface for
graphing of monitoring systems, leading to authentication bypass and
cross-site scripting (XSS). An attacker may get access to unauthorized
areas and impersonate other users, under certain conditions.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-10060&lt;/p&gt;
&lt;p&gt;Cacti has XSS because it does not properly reject unintended
characters, related to use of the sanitize_uri function in
lib/functions.php.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-10061&lt;/p&gt;
&lt;p&gt;Cacti has XSS because it makes certain htmlspecialchars calls
without the ENT_QUOTES flag (these calls occur when the
html_escape function in lib/html.php is not used).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-13230&lt;/p&gt;
&lt;p&gt;Disabling a user account does not immediately invalidate any
permissions granted to that account (e.g., permission to view
logs).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-23226&lt;/p&gt;
&lt;p&gt;Multiple Cross Site Scripting (XSS) vulnerabilities exist in
multiple files.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-23225&lt;/p&gt;
&lt;p&gt;Cacti allows authenticated users with User Management permissions
to inject arbitrary web script or HTML in the &amp;ldquo;new_username&amp;rdquo; field
during creation of a new user via &amp;ldquo;Copy&amp;rdquo; method at user_admin.php.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-0730&lt;/p&gt;
&lt;p&gt;Under certain ldap conditions, Cacti authentication can be
bypassed with certain credential types.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Additionally, follow-up fixes were included for CVE-2019-11025
(DLA-1757-1) and CVE-2020-7106 (DLA-2069-1).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-587-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-587-1-libdatetime-timezone-perl/</link>
      <pubDate>Tue, 29 Mar 2022 19:23:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-587-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-587-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2022a&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022a for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-586-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-586-1-tzdata/</link>
      <pubDate>Tue, 29 Mar 2022 19:19:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-586-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-586-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u3&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2022a. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adjusted DST rules for Palestine, already in effect.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-584-2 bind9 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-584-2-bind9/</link>
      <pubDate>Wed, 23 Mar 2022 01:24:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-584-2-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-584-2-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u24&lt;/p&gt;


      &lt;p&gt;The patch for CVE-2021-25220 caused a regression in the isc-dhcp-client package
which prevented network configuration via the dhclient. This patch has been
reverted until the regression can be properly addressed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-585-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-585-1-apache2/</link>
      <pubDate>Tue, 22 Mar 2022 08:33:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-585-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-585-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22719&#34;&gt;CVE-2022-22719&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22720&#34;&gt;CVE-2022-22720&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22721&#34;&gt;CVE-2022-22721&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23943&#34;&gt;CVE-2022-23943&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Apache HTTP server,
which could result in denial of service, request smuggling or buffer
overflows.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-584-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-584-1-bind9/</link>
      <pubDate>Mon, 21 Mar 2022 15:18:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-584-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-584-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u24&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25220&#34;&gt;CVE-2021-25220&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that bind9, an internet domain name server, was vulnerable to
cache poisoning. When using forwarders, bogus NS records supplied by, or via,
those forwarders may be cached and used by named if it needs to recurse for any
reason, causing it to obtain and pass on potentially incorrect answers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-583-1 paramiko security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-583-1-paramiko/</link>
      <pubDate>Mon, 21 Mar 2022 11:50:23 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-583-1-paramiko/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-583-1-paramiko/">
      
&lt;p&gt;Package : paramiko&lt;/p&gt;


&lt;p&gt;Version : 1.15.1-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24302&#34;&gt;CVE-2022-24302&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential race condition in Paramiko, a
pure-Python implementation of the SSH algorithm. In particular, unauthorised
information disclosure could have occurred during the creation of SSH private
keys.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-582-1 wordpress security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-582-1-wordpress/</link>
      <pubDate>Mon, 21 Mar 2022 00:02:47 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-582-1-wordpress/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-582-1-wordpress/">
      
&lt;p&gt;Package : wordpress&lt;/p&gt;


&lt;p&gt;Version : 4.1.35&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;Several vulnerabilities like Prototype Pollution Vulnerability in a
jQuery dependency and in the block editor, and Stored Cross Site
Scripting Vulnerability were discovered in Wordpress, a web blogging
tool.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-581-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-581-1-libxml2/</link>
      <pubDate>Thu, 17 Mar 2022 21:55:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-581-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-581-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23308&#34;&gt;CVE-2022-23308&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;One vulnerability has been discovered in the libxml2: GNOME XML library.&lt;/p&gt;
&lt;p&gt;CVE-2022-23308&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;the application that validates XML using xmlTextReaderRead() with XML_PARSE_DTDATTR
and XML_PARSE_DTDVALID enabled becomes vulnerable to this use-after-free bug.
This issue can result in denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-580-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-580-1-openssl/</link>
      <pubDate>Thu, 17 Mar 2022 10:54:55 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-580-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-580-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0778&#34;&gt;CVE-2022-0778&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL
could be tricked into an infinite loop. This could result in denial of
service via malformed certificates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-579-1 debian-archive-keyring update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-579-1-debian-archive-keyring/</link>
      <pubDate>Wed, 16 Mar 2022 22:29:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-579-1-debian-archive-keyring/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-579-1-debian-archive-keyring/">
      
&lt;p&gt;Package : debian-archive-keyring&lt;/p&gt;


&lt;p&gt;Version : 2017.5~deb8u2&lt;/p&gt;


      &lt;p&gt;debian-archive-keyring is a package containing GnuPG archive keys of the Debian
archive. New GPG-keys are being constantly added with every new Debian release.&lt;/p&gt;
&lt;p&gt;For Debian 8 Jessie, GPG-keys for 10/buster and 11/bullseye Debian release are added
in the version 2017.5~deb8u2.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-578-1 flac security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-578-1-flac/</link>
      <pubDate>Thu, 17 Mar 2022 02:42:18 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-578-1-flac/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-578-1-flac/">
      
&lt;p&gt;Package : flac&lt;/p&gt;


&lt;p&gt;Version : 1.3.0-3&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0561&#34;&gt;CVE-2021-0561&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is
a possible out of bounds write due to a missing bounds check. This
could lead to local information disclosure with no additional
execution privileges needed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-577-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-577-1-linux-4.9/</link>
      <pubDate>Wed, 16 Mar 2022 08:57:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-577-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-577-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.303-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3640&#34;&gt;CVE-2021-3640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3752&#34;&gt;CVE-2021-3752&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4002&#34;&gt;CVE-2021-4002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4083&#34;&gt;CVE-2021-4083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4155&#34;&gt;CVE-2021-4155&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4202&#34;&gt;CVE-2021-4202&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28711&#34;&gt;CVE-2021-28711&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28712&#34;&gt;CVE-2021-28712&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28713&#34;&gt;CVE-2021-28713&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28714&#34;&gt;CVE-2021-28714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28715&#34;&gt;CVE-2021-28715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29264&#34;&gt;CVE-2021-29264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33033&#34;&gt;CVE-2021-33033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39685&#34;&gt;CVE-2021-39685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39686&#34;&gt;CVE-2021-39686&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39698&#34;&gt;CVE-2021-39698&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39714&#34;&gt;CVE-2021-39714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43976&#34;&gt;CVE-2021-43976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45095&#34;&gt;CVE-2021-45095&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0001&#34;&gt;CVE-2022-0001&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0002&#34;&gt;CVE-2022-0002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0330&#34;&gt;CVE-2022-0330&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0435&#34;&gt;CVE-2022-0435&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0487&#34;&gt;CVE-2022-0487&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0492&#34;&gt;CVE-2022-0492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0617&#34;&gt;CVE-2022-0617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24448&#34;&gt;CVE-2022-24448&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25258&#34;&gt;CVE-2022-25258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25375&#34;&gt;CVE-2022-25375&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-3640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;LinMa of BlockSec Team discovered a race condition in the
Bluetooth SCO implementation that can lead to a use-after-free.  A
local user could exploit this to cause a denial of service (memory
corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3752&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Likang Luo of NSFOCUS Security Team discovered a flaw in the
Bluetooth L2CAP implementation that can lead to a user-after-free.
A local user could exploit this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-4002&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that hugetlbfs, the virtual filesystem used by
applications to allocate huge pages in RAM, did not flush the
CPU&#39;s TLB in one case where it was necessary.  In some
circumstances a local user would be able to read and write huge
pages after they are freed and reallocated to a different process.
This could lead to privilege escalation, denial of service or
information leaks.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-4083&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a race condition in the local (Unix) sockets
garbage collector, that can lead to use-after-free.  A local user
could exploit this to cause a denial of service (memory corruption
or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-4155&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kirill Tkhai discovered a data leak in the way the XFS_IOC_ALLOCSP
IOCTL in the XFS filesystem allowed for a size increase of files
with unaligned size. A local attacker can take advantage of this
flaw to leak data on the XFS filesystem.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-4202&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lin Ma discovered a race condition in the NCI (NFC Controller
Interface) driver, which could lead to a use-after-free.  A local
user could exploit this to cause a denial of service (memory
corruption or crash) or possibly for privilege escalation.

This protocol is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28711, CVE-2021-28712, CVE-2021-28713 (XSA-391)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Juergen Gross reported that malicious PV backends can cause a denial
of service to guests being serviced by those backends via high
frequency events, even if those backends are running in a less
privileged environment.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28714, CVE-2021-28715 (XSA-392)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Juergen Gross discovered that Xen guests can force the Linux
netback driver to hog large amounts of kernel memory, resulting in
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29264&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the &amp;quot;gianfar&amp;quot; Ethernet driver used with
some Freescale SoCs did not correctly handle a Rx queue overrun
when jumbo packets were enabled.  On systems using this driver and
jumbo packets, an attacker on the network could exploit this to
cause a denial of service (crash).

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33033&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a reference counting bug in the CIPSO
implementation that can lead to a use-after-free.

This protocol is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-39685&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Szymon Heidrich discovered a buffer overflow vulnerability in the
USB gadget subsystem, resulting in information disclosure, denial of
service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-39686&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the Android binder driver, that
could lead to incorrect security checks.  On systems where the
binder driver is loaded, a local user could exploit this for
privilege escalation.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-39698&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Linus Torvalds reported a flaw in the file polling implementation,
which could lead to a use-after-free.  A local user could exploit
this for denial of service (memory corruption or crash) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-39714&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential reference count overflow was found in the Android Ion
driver.  On systems where the Ion driver is loaded, a local user
could exploit this for denial of service (memory corruption or
crash) or possibly for privilege escalation.

This driver is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-43976&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zekun Shen and Brendan Dolan-Gavitt discovered a flaw in the
mwifiex_usb_recv() function of the Marvell WiFi-Ex USB Driver. An
attacker able to connect a crafted USB device can take advantage of
this flaw to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-45095&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Phone Network protocol (PhoNet) driver
has a reference count leak in the pep_sock_accept() function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0001 (INTEL-SA-00598)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Researchers at VUSec discovered that the Branch History Buffer in
Intel processors can be exploited to create information side-
channels with speculative execution.  This issue is similar to
Spectre variant 2, but requires additional mitigations on some
processors.

This can be exploited to obtain sensitive information from a
different security context, such as from user-space to the kernel,
or from a KVM guest to the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0002 (INTEL-SA-00598)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This is a similar issue to CVE-2022-0001, but covers exploitation
within a security context, such as from JIT-compiled code in a
sandbox to hosting code in the same process.

This can be partly mitigated by disabling eBPF for unprivileged
users with the sysctl: kernel.unprivileged_bpf_disabled=2.  This
update does that by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0330&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sushma Venkatesh Reddy discovered a missing GPU TLB flush in the
i915 driver, resulting in denial of service or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0435&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Samuel Page and Eric Dumazet reported a stack overflow in the
networking module for the Transparent Inter-Process Communication
(TIPC) protocol, resulting in denial of service or potentially the
execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0487&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free was discovered in the MOXART SD/MMC Host Controller
support driver. This flaw does not impact the Debian binary packages
as CONFIG_MMC_MOXART is not set.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0492&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yiqi Sun and Kevin Wang reported that the cgroup-v1 subsystem does
not properly restrict access to the release-agent feature. A local
user can take advantage of this flaw for privilege escalation and
bypass of namespace isolation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;butt3rflyh4ck discovered a NULL pointer dereference in the UDF
filesystem. A local user that can mount a specially crafted UDF
image can use this flaw to crash the system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-24448&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lyu Tao reported a flaw in the NFS implementation in the Linux
kernel when handling requests to open a directory on a regular file,
which could result in a information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-25258&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Szymon Heidrich reported the USB Gadget subsystem lacks certain
validation of interface OS descriptor requests, resulting in memory
corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-25375&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Szymon Heidrich reported that the RNDIS USB gadget lacks validation
of the size of the RNDIS_MSG_SET command, resulting in information
leak from kernel memory.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-576-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-576-1-vim/</link>
      <pubDate>Tue, 15 Mar 2022 23:40:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-576-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-576-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 2:7.4.488-7&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20807&#34;&gt;CVE-2019-20807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3778&#34;&gt;CVE-2021-3778&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3796&#34;&gt;CVE-2021-3796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3872&#34;&gt;CVE-2021-3872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3927&#34;&gt;CVE-2021-3927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3928&#34;&gt;CVE-2021-3928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3973&#34;&gt;CVE-2021-3973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3974&#34;&gt;CVE-2021-3974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3984&#34;&gt;CVE-2021-3984&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4019&#34;&gt;CVE-2021-4019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4069&#34;&gt;CVE-2021-4069&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4192&#34;&gt;CVE-2021-4192&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4193&#34;&gt;CVE-2021-4193&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0213&#34;&gt;CVE-2022-0213&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0319&#34;&gt;CVE-2022-0319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0359&#34;&gt;CVE-2022-0359&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0361&#34;&gt;CVE-2022-0361&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0368&#34;&gt;CVE-2022-0368&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0408&#34;&gt;CVE-2022-0408&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0554&#34;&gt;CVE-2022-0554&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0685&#34;&gt;CVE-2022-0685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0714&#34;&gt;CVE-2022-0714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0729&#34;&gt;CVE-2022-0729&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in vim, an enhanced vi
editor. Buffer overflows, out-of-bounds reads and Null pointer derefrences may
lead to a denial of service (application crash) or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-575-1 twisted security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-575-1-twisted/</link>
      <pubDate>Tue, 08 Mar 2022 12:04:24 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-575-1-twisted/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-575-1-twisted/">
      
&lt;p&gt;Package : twisted&lt;/p&gt;


&lt;p&gt;Version : 14.0.2-3&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21716&#34;&gt;CVE-2022-21716&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an issue in the Twisted Python network
framework where SSH client and server implementations could accept an infinite
amount of data for the peer&amp;rsquo;s SSH version identifier and that a buffer then
uses all available memory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-574-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-574-1-expat/</link>
      <pubDate>Mon, 07 Mar 2022 14:59:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-574-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-574-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-6&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23852&#34;&gt;CVE-2022-23852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25235&#34;&gt;CVE-2022-25235&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25236&#34;&gt;CVE-2022-25236&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25313&#34;&gt;CVE-2022-25313&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-25315&#34;&gt;CVE-2022-25315&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in Expat, an XML parsing C
library, which could result in denial of service or potentially the
execution of arbitrary code, if a malformed XML file is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-573-1 cyrus-sasl2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-573-1-cyrus-sasl2/</link>
      <pubDate>Sun, 06 Mar 2022 18:11:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-573-1-cyrus-sasl2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-573-1-cyrus-sasl2/">
      
&lt;p&gt;Package : cyrus-sasl2&lt;/p&gt;


&lt;p&gt;Version : 2.1.26.dfsg1-13&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24407&#34;&gt;CVE-2022-24407&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the SQL plugin in cyrus-sasl2, a library implementing
the Simple Authentication and Security Layer, is prone to a SQL injection attack.
An authenticated remote attacker can take advantage of this flaw to execute
arbitrary SQL commands and for privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-572-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-572-1-python3.4/</link>
      <pubDate>Thu, 03 Mar 2022 16:59:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-572-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-572-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3177&#34;&gt;CVE-2021-3177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4189&#34;&gt;CVE-2021-4189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23336&#34;&gt;CVE-2021-23336&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were found in Python 3.4, an interactive
high-level object-oriented language, that could result in denial
of service, port scanning, web cache poisoning or potentially
code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-571-1 usbredir security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-571-1-usbredir/</link>
      <pubDate>Wed, 02 Mar 2022 12:38:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-571-1-usbredir/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-571-1-usbredir/">
      
&lt;p&gt;Package : usbredir&lt;/p&gt;


&lt;p&gt;Version : 0.7-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3700&#34;&gt;CVE-2021-3700&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A use-after-free vulnerability was found in Usbredirparser, a parser
for the usbredir protocol, which could result in denial of service or
potentially arbitrary code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-570-1 htmldoc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-570-1-htmldoc/</link>
      <pubDate>Sat, 26 Feb 2022 12:15:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-570-1-htmldoc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-570-1-htmldoc/">
      
&lt;p&gt;Package : htmldoc&lt;/p&gt;


&lt;p&gt;Version : 1.8.27-8&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40985&#34;&gt;CVE-2021-40985&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43579&#34;&gt;CVE-2021-43579&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0534&#34;&gt;CVE-2022-0534&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in htmldoc, an HTML processor that generates indexed HTML, PS, and PDF.&lt;/p&gt;
&lt;p&gt;CVE-2022-0534&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; A crafted GIF file could lead to a stack out-of-bounds read,
 which could result in a crash (segmentation fault).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-43579&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Converting an HTML document, which links to a crafted BMP file,
 could lead to a stack-based buffer overflow, which could result
 in remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40985&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; A crafted BMP image could lead to a buffer overflow, which could
 cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-569-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-569-1-tiff/</link>
      <pubDate>Thu, 24 Feb 2022 00:04:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-569-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-569-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0561&#34;&gt;CVE-2022-0561&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-0562&#34;&gt;CVE-2022-0562&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22844&#34;&gt;CVE-2022-22844&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in tiff, a library and tools to manipulate and convert files in the Tag Image File Format (TIFF).&lt;/p&gt;
&lt;p&gt;CVE-2022-22844&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;out-of-bounds read in _TIFFmemcpy in certain situations involving a
custom tag and 0x0200 as the second word of the DE field.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0562&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Null source pointer passed as an argument to memcpy() function within
TIFFReadDirectory(). This could result in a Denial of Service via
crafted TIFF files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2022-0561&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Null source pointer passed as an argument to memcpy() function within
TIFFFetchStripThing(). This could result in a Denial of Service via
crafted TIFF files.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-567-2 apache2 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-567-2-apache2/</link>
      <pubDate>Sun, 20 Feb 2022 11:25:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-567-2-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-567-2-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u21&lt;/p&gt;


      &lt;p&gt;The patch for CVE-2021-44224 introduced an unknown symbol, which prevents apache2 from starting.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-568-1 ksh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-568-1-ksh/</link>
      <pubDate>Sun, 20 Feb 2022 01:36:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-568-1-ksh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-568-1-ksh/">
      
&lt;p&gt;Package : ksh&lt;/p&gt;


&lt;p&gt;Version : 93u&amp;#43;20120801-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14868&#34;&gt;CVE-2019-14868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in the way it evaluates certain
environment variables. An attacker could use this
flaw to override or bypass environment restrictions
to execute shell commands. Services and
applications that allow remote unauthenticated
attackers to provide one of those environment
variables could allow them to exploit this issue
remotely.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-566-1 twisted security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-566-1-twisted/</link>
      <pubDate>Sat, 19 Feb 2022 17:31:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-566-1-twisted/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-566-1-twisted/">
      
&lt;p&gt;Package : twisted&lt;/p&gt;


&lt;p&gt;Version : 14.0.2-3&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21712&#34;&gt;CVE-2022-21712&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Twisted, a Python event-based framework for
internet applications, exposes cookies and authorization headers when
following cross-origin redirects. This issue is present in the
&lt;code&gt;twisted.web.RedirectAgent&lt;/code&gt; and &lt;code&gt;twisted.web.BrowserLikeRedirectAgent&lt;/code&gt;
functions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-567-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-567-1-apache2/</link>
      <pubDate>Sat, 19 Feb 2022 17:07:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-567-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-567-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44224&#34;&gt;CVE-2021-44224&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44790&#34;&gt;CVE-2021-44790&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been discovered in the Apache HTTP server:&lt;/p&gt;
&lt;p&gt;CVE-2021-44224&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When operating as a forward proxy, Apache was depending on the setup suspectable to denial of service or Server Side Request forgery.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-44790&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow in mod_lua may result in denial of service or potentially the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-565-1 zsh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-565-1-zsh/</link>
      <pubDate>Fri, 18 Feb 2022 09:35:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-565-1-zsh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-565-1-zsh/">
      
&lt;p&gt;Package : zsh&lt;/p&gt;


&lt;p&gt;Version : 5.0.7-5&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45444&#34;&gt;CVE-2021-45444&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that zsh, a powerful shell and scripting language,
did not prevent recursive prompt expansion. This would allow an
attacker to execute arbitrary commands into a user&amp;rsquo;s shell, for
instance by tricking a vcs_info user into checking out a git branch
with a specially crafted name.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-564-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-564-1-libxstream-java/</link>
      <pubDate>Tue, 15 Feb 2022 13:48:11 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-564-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-564-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43859&#34;&gt;CVE-2021-43859&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential remote denial of service (DoS)
attack in XStream, a Java library used to serialize objects to XML and back
again.&lt;/p&gt;
&lt;p&gt;An attacker could have consumed 100% of the CPU resources, but the library now
monitors and accumulates the time it takes to add elements to collections, and
throws an exception if a set threshold is exceeded.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-563-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-563-1-openjdk-8/</link>
      <pubDate>Thu, 10 Feb 2022 11:50:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-563-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-563-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u322-b06-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21248&#34;&gt;CVE-2022-21248&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21282&#34;&gt;CVE-2022-21282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21283&#34;&gt;CVE-2022-21283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21293&#34;&gt;CVE-2022-21293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21294&#34;&gt;CVE-2022-21294&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21296&#34;&gt;CVE-2022-21296&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21299&#34;&gt;CVE-2022-21299&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21305&#34;&gt;CVE-2022-21305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21340&#34;&gt;CVE-2022-21340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21341&#34;&gt;CVE-2022-21341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21349&#34;&gt;CVE-2022-21349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21360&#34;&gt;CVE-2022-21360&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21365&#34;&gt;CVE-2022-21365&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
which may result in denial of service, bypass of deserialization
restrictions or information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-562-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-562-1-zabbix/</link>
      <pubDate>Mon, 07 Feb 2022 22:49:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-562-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-562-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23134&#34;&gt;CVE-2022-23134&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Thomas Chauchefoin from SonarSource discovered that in Zabbix, a
server/client network monitoring system, after the initial setup
process, some steps of setup.php file are reachable not only by
super-administrators, but by unauthenticated users as well. An
attacker could bypass checks and potentially change the configuration
of Zabbix Frontend.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-561-1 xterm security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-561-1-xterm/</link>
      <pubDate>Mon, 07 Feb 2022 22:09:44 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-561-1-xterm/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-561-1-xterm/">
      
&lt;p&gt;Package : xterm&lt;/p&gt;


&lt;p&gt;Version : 312-2&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-24130&#34;&gt;CVE-2022-24130&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;xterm, an X terminal emulator, when Sixel support is enabled, allows attackers
to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-560-1 libphp-adodb security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-560-1-libphp-adodb/</link>
      <pubDate>Sun, 06 Feb 2022 14:20:19 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-560-1-libphp-adodb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-560-1-libphp-adodb/">
      
&lt;p&gt;Package : libphp-adodb&lt;/p&gt;


&lt;p&gt;Version : 5.15-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3850&#34;&gt;CVE-2021-3850&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that in libphp-adodb, a PHP database abstraction layer
library, an attacker can inject values into the PostgreSQL connection
string by bypassing adodb_addslashes(). The function can be bypassed
in phppgadmin, for example, by surrounding the username in quotes and
submitting with other parameters injected in between.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-559-1 dojo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-559-1-dojo/</link>
      <pubDate>Sun, 06 Feb 2022 14:03:01 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-559-1-dojo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-559-1-dojo/">
      
&lt;p&gt;Package : dojo&lt;/p&gt;


&lt;p&gt;Version : 1.10.2&amp;#43;dfsg-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6561&#34;&gt;CVE-2018-6561&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-4051&#34;&gt;CVE-2020-4051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23450&#34;&gt;CVE-2021-23450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in src:dojo, as follows:&lt;/p&gt;
&lt;p&gt;CVE-2018-6561&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;`dijit.Editor` in Dojo allows XSS via the onload attribute
of an SVG element.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-4051&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In Dijit, there is a cross-site scripting vulnerability in
the Editor&#39;s LinkDialog plugin.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23450&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was found that Dojo is vulnerable to Prototype Pollution
via the setObject function.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-558-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-558-1-python-django/</link>
      <pubDate>Tue, 01 Feb 2022 11:13:05 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-558-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-558-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u15&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22818&#34;&gt;CVE-2022-22818&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23833&#34;&gt;CVE-2022-23833&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two vulnerabilities in Django, the popular
Python-based web development framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-22818: Possible XSS via the &lt;code&gt;{% debug %}&lt;/code&gt; template tag.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;{% debug %}&lt;/code&gt; template tag didn&amp;rsquo;t properly encode the current context,
posing an XSS attack vector.&lt;/p&gt;
&lt;p&gt;In order to avoid this vulnerability, &lt;code&gt;{% debug %}&lt;/code&gt; no longer outputs
information when the &lt;code&gt;DEBUG&lt;/code&gt; setting is False, and it ensures all context
variables are correctly escaped when the &lt;code&gt;DEBUG&lt;/code&gt; setting is &lt;code&gt;True&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2022-23833: Denial-of-service possibility in file uploads&lt;/p&gt;
&lt;p&gt;Passing certain inputs to multipart forms could result in an infinite loop
when parsing files.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-557-1 apache-log4j1.2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-557-1-apache-log4j1.2/</link>
      <pubDate>Tue, 01 Feb 2022 12:48:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-557-1-apache-log4j1.2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-557-1-apache-log4j1.2/">
      
&lt;p&gt;Package : apache-log4j1.2&lt;/p&gt;


&lt;p&gt;Version : 1.2.17-5&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4104&#34;&gt;CVE-2021-4104&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23302&#34;&gt;CVE-2022-23302&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23305&#34;&gt;CVE-2022-23305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23307&#34;&gt;CVE-2022-23307&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in Apache Log4j 1.2, a
Java logging framework, when it is configured to use JMSSink, JDBCAppender,
JMSAppender or Apache Chainsaw which could be exploited for remote code
execution.&lt;/p&gt;
&lt;p&gt;Note that a possible attacker requires write access to the Log4j configuration
and the aforementioned features are not enabled by default. In order to
completely mitigate against these type of vulnerabilities the related classes
have been removed from the resulting jar file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-556-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-556-1-expat/</link>
      <pubDate>Tue, 01 Feb 2022 12:46:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-556-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-556-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-6&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45960&#34;&gt;CVE-2021-45960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46143&#34;&gt;CVE-2021-46143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22822&#34;&gt;CVE-2022-22822&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22823&#34;&gt;CVE-2022-22823&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22824&#34;&gt;CVE-2022-22824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22825&#34;&gt;CVE-2022-22825&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22826&#34;&gt;CVE-2022-22826&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22827&#34;&gt;CVE-2022-22827&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23852&#34;&gt;CVE-2022-23852&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-23990&#34;&gt;CVE-2022-23990&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in Expat, the XML
parsing C library. Integer overflows or invalid shifts may lead to a denial of
service or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-555-1 shadow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-555-1-shadow/</link>
      <pubDate>Tue, 01 Feb 2022 14:20:21 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-555-1-shadow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-555-1-shadow/">
      
&lt;p&gt;Package : shadow&lt;/p&gt;


&lt;p&gt;Version : 1:4.2-3&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12424&#34;&gt;CVE-2017-12424&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7169&#34;&gt;CVE-2018-7169&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2017-12424&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that shadow incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
expose sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that shadow incorrectly handled certain inputs.
An attacker could possibly use this issue to expose sensitive
information.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-554-1 qt4-x11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-554-1-qt4-x11/</link>
      <pubDate>Tue, 01 Feb 2022 04:17:51 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-554-1-qt4-x11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-554-1-qt4-x11/">
      
&lt;p&gt;Package : qt4-x11&lt;/p&gt;


&lt;p&gt;Version : 4:4.8.6&amp;#43;git64-g5dc8b2b&amp;#43;dfsg-3&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19872&#34;&gt;CVE-2018-19872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3481&#34;&gt;CVE-2021-3481&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45930&#34;&gt;CVE-2021-45930&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple out-of-bounds error were discovered in qt4-x11.
The highest threat from CVE-2021-3481 (at least) is to data
confidentiality the application availability.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-541-2 uriparser security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-541-2-uriparser/</link>
      <pubDate>Wed, 26 Jan 2022 09:38:43 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-541-2-uriparser/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-541-2-uriparser/">
      
&lt;p&gt;Package : uriparser&lt;/p&gt;


&lt;p&gt;Version : 0.8.0.1-2&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46141&#34;&gt;CVE-2021-46141&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the fix for CVE-2021-46141 released in uriparser version
0.8.0.1-2+deb8u3 was incomplete.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-553-1 libxfont security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-553-1-libxfont/</link>
      <pubDate>Tue, 25 Jan 2022 23:09:10 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-553-1-libxfont/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-553-1-libxfont/">
      
&lt;p&gt;Package : libxfont&lt;/p&gt;


&lt;p&gt;Version : 1:1.5.1-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16611&#34;&gt;CVE-2017-16611&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libxfont, an X11 font rasterisation library.
By creating symlinks, a local attacker can open (but not read) local files as user root.
This might create unwanted actions with special files like /dev/watchdog.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-552-1 lrzsz security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-552-1-lrzsz/</link>
      <pubDate>Tue, 25 Jan 2022 23:00:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-552-1-lrzsz/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-552-1-lrzsz/">
      
&lt;p&gt;Package : lrzsz&lt;/p&gt;


&lt;p&gt;Version : 0.12.21-7&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10195&#34;&gt;CVE-2018-10195&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issues has been found in lrzsz, a set of tools for zmodem/xmodem/ymodem file transfer.
Due to an incorrect length check, which might result in a size_t wrap around, an information leak to the receiving side could happen.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-551-1 policykit-1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-551-1-policykit-1/</link>
      <pubDate>Tue, 25 Jan 2022 19:35:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-551-1-policykit-1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-551-1-policykit-1/">
      
&lt;p&gt;Package : policykit-1&lt;/p&gt;


&lt;p&gt;Version : 0.105-15~deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4034&#34;&gt;CVE-2021-4034&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Research Labs discovered a local privilege escalation in
PolicyKit&amp;rsquo;s pkexec.&lt;/p&gt;
&lt;p&gt;Details can be found in the Qualys advisory at
&lt;a href=&#34;https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt&#34;&gt;https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-550-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-550-1-nss/</link>
      <pubDate>Tue, 25 Jan 2022 16:23:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-550-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-550-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u16&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22747&#34;&gt;CVE-2022-22747&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that nss, the Mozilla Network Security Service library, was
vulnerable to a NULL pointer dereference when parsing empty PKCS 7
sequences, which could result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-549-1 apr security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-549-1-apr/</link>
      <pubDate>Mon, 24 Jan 2022 23:37:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-549-1-apr/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-549-1-apr/">
      
&lt;p&gt;Package : apr&lt;/p&gt;


&lt;p&gt;Version : 1.5.1-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12613&#34;&gt;CVE-2017-12613&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in apr, the Apache Portable Runtime Library.
The issue is related to out of bounds memory access due to invalid date fields.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-548-1 ipython security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-548-1-ipython/</link>
      <pubDate>Mon, 24 Jan 2022 08:45:13 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-548-1-ipython/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-548-1-ipython/">
      
&lt;p&gt;Package : ipython&lt;/p&gt;


&lt;p&gt;Version : 2.3.0-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21699&#34;&gt;CVE-2022-21699&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential arbitrary code execution
vulnerability in IPython, the interactive Python shell.&lt;/p&gt;
&lt;p&gt;This issue stemmed from IPython executing untrusted files in the current
working directory. According to upstream:&lt;/p&gt;
&lt;p&gt;Almost all versions of IPython looks for configuration and profiles in
current working directory. Since IPython was developed before pip and
environments existed, it was used a convenient way to load code/packages in a
project dependant way.&lt;/p&gt;
&lt;p&gt;In 2022, it is not necessary anymore, and can lead to confusing behavior
where for example cloning a repository and starting IPython or loading a
notebook from any Jupyter-Compatible interface that has ipython set as a
kernel can lead to code execution.&lt;/p&gt;
&lt;p&gt;To address this problem, the current working directory is no longer searched
for profiles or configuration files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-547-1 golang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-547-1-golang/</link>
      <pubDate>Mon, 24 Jan 2022 16:42:10 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-547-1-golang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-547-1-golang/">
      
&lt;p&gt;Package : golang&lt;/p&gt;


&lt;p&gt;Version : 2:1.3.3-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33196&#34;&gt;CVE-2021-33196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36221&#34;&gt;CVE-2021-36221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39293&#34;&gt;CVE-2021-39293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41771&#34;&gt;CVE-2021-41771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-44717&#34;&gt;CVE-2021-44717&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Go programming
language. An attacker could trigger denial-of-service (DoS) and
information leak.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-33196&lt;/p&gt;
&lt;p&gt;In archive/zip, a crafted file count (in an archive&amp;rsquo;s header) can
cause a NewReader or OpenReader panic.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-36221&lt;/p&gt;
&lt;p&gt;Go has a race condition that can lead to a net/http/httputil
ReverseProxy panic upon an ErrAbortHandler abort.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-39293&lt;/p&gt;
&lt;p&gt;Follow-up fix to CVE-2021-33196&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-41771&lt;/p&gt;
&lt;p&gt;ImportedSymbols in debug/macho (for Open or OpenFat) accesses a
Memory Location After the End of a Buffer, aka an out-of-bounds
slice situation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-44717&lt;/p&gt;
&lt;p&gt;Go on UNIX allows write operations to an unintended file or
unintended network connection as a consequence of erroneous
closing of file descriptor 0 after file-descriptor exhaustion.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-546-1 pillow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-546-1-pillow/</link>
      <pubDate>Mon, 24 Jan 2022 11:20:44 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-546-1-pillow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-546-1-pillow/">
      
&lt;p&gt;Package : pillow&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-2&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28675&#34;&gt;CVE-2021-28675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28676&#34;&gt;CVE-2021-28676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28677&#34;&gt;CVE-2021-28677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-34552&#34;&gt;CVE-2021-34552&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22815&#34;&gt;CVE-2022-22815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22816&#34;&gt;CVE-2022-22816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-22817&#34;&gt;CVE-2022-22817&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Pillow, a Python imaging
library, which could result in denial of service and potentially
the execution of arbitrary code if malformed images are processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-545-1 aide security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-545-1-aide/</link>
      <pubDate>Mon, 24 Jan 2022 02:26:23 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-545-1-aide/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-545-1-aide/">
      
&lt;p&gt;Package : aide&lt;/p&gt;


&lt;p&gt;Version : 0.16~a2.git20130520-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45417&#34;&gt;CVE-2021-45417&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;David Bouman discovered a heap-based buffer overflow vulnerability in
the base64 functions of aide, an advanced intrusion detection system,
which can be triggered via large extended file attributes or ACLs. This
may result in denial of service or privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-543-1 qtsvg-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-543-1-qtsvg-opensource-src/</link>
      <pubDate>Mon, 24 Jan 2022 02:21:34 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-543-1-qtsvg-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-543-1-qtsvg-opensource-src/">
      
&lt;p&gt;Package : qtsvg-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.3.2-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19869&#34;&gt;CVE-2018-19869&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3481&#34;&gt;CVE-2021-3481&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45930&#34;&gt;CVE-2021-45930&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple out-of-bounds error were discovered in qtsvg-opensource-src.
The highest threat from CVE-2021-3481 (at least) is to data
confidentiality the application availability.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-544-1 libspf2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-544-1-libspf2/</link>
      <pubDate>Fri, 21 Jan 2022 00:16:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-544-1-libspf2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-544-1-libspf2/">
      
&lt;p&gt;Package : libspf2&lt;/p&gt;


&lt;p&gt;Version : 1.2.10-5&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33912&#34;&gt;CVE-2021-33912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33913&#34;&gt;CVE-2021-33913&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in libspf2, a library for validating mail senders with SPF.
Both issues are related to heap-based buffer overflows.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-542-1 gdal security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-542-1-gdal/</link>
      <pubDate>Mon, 17 Jan 2022 11:58:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-542-1-gdal/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-542-1-gdal/">
      
&lt;p&gt;Package : gdal&lt;/p&gt;


&lt;p&gt;Version : 1.10.1&amp;#43;dfsg-8&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45943&#34;&gt;CVE-2021-45943&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue was found in GDAL, a geospatial library, that could lead to
denial of service via application crash or possibly the execution of
arbitrary code if maliciously crafted data was parsed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-541-1 uriparser security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-541-1-uriparser/</link>
      <pubDate>Mon, 17 Jan 2022 10:37:17 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-541-1-uriparser/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-541-1-uriparser/">
      
&lt;p&gt;Package : uriparser&lt;/p&gt;


&lt;p&gt;Version : 0.8.0.1-2&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46141&#34;&gt;CVE-2021-46141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-46142&#34;&gt;CVE-2021-46142&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two &amp;ldquo;invalid free&amp;rdquo; issues in &lt;code&gt;uriparser&lt;/code&gt;, a C
library for parsing URLs according to RFC 3986.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-540-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-540-1-ghostscript/</link>
      <pubDate>Sun, 16 Jan 2022 23:25:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-540-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-540-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45944&#34;&gt;CVE-2021-45944&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-45949&#34;&gt;CVE-2021-45949&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security issues were discovered in Ghostscript, the GPL PostScript/PDF
interpreter, which could result in denial of service and potentially the
execution of arbitrary code if malformed document files are processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-539-1 wordpress security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-539-1-wordpress/</link>
      <pubDate>Thu, 13 Jan 2022 02:59:05 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-539-1-wordpress/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-539-1-wordpress/">
      
&lt;p&gt;Package : wordpress&lt;/p&gt;


&lt;p&gt;Version : 4.1.34&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21661&#34;&gt;CVE-2022-21661&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21662&#34;&gt;CVE-2022-21662&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21663&#34;&gt;CVE-2022-21663&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2022-21664&#34;&gt;CVE-2022-21664&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform SQL injection, run
unchecked SQL queries, bypass hardening, or perform Cross-Site
Scripting (XSS) attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-538-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-538-1-clamav/</link>
      <pubDate>Mon, 10 Jan 2022 17:59:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-538-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-538-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.103.4&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;Version 0.102 of ClamAV, an anti-virus toolkit, is end-of-life. ClamAV
has been updated to version 0.103 to be able to receive virus signature
updates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-537-1 salt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-537-1-salt/</link>
      <pubDate>Mon, 03 Jan 2022 19:21:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-537-1-salt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-537-1-salt/">
      
&lt;p&gt;Package : salt&lt;/p&gt;


&lt;p&gt;Version : 2014.1.13&amp;#43;ds-3&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16846&#34;&gt;CVE-2020-16846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-17490&#34;&gt;CVE-2020-17490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35662&#34;&gt;CVE-2020-35662&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3197&#34;&gt;CVE-2021-3197&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21996&#34;&gt;CVE-2021-21996&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25282&#34;&gt;CVE-2021-25282&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25283&#34;&gt;CVE-2021-25283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25284&#34;&gt;CVE-2021-25284&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in Salt, a
powerful remote execution manager, that allow for local privilege
escalation on a minion, server side template injection attacks, shell
and command injections or incorrect validation of SSL certificates.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-16846&lt;/p&gt;
&lt;p&gt;Sending crafted web requests to the Salt API, with the SSH client
enabled, can result in shell injection.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-17490&lt;/p&gt;
&lt;p&gt;The TLS module creates certificates with weak file permissions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-35662&lt;/p&gt;
&lt;p&gt;When authenticating to services using certain modules, the SSL
certificate is not always validated.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-3197&lt;/p&gt;
&lt;p&gt;The salt-api&amp;rsquo;s ssh client is vulnerable to a shell injection by
including ProxyCommand in an argument, or via ssh_options provided
in an API request.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-21996&lt;/p&gt;
&lt;p&gt;A user who has control of the source, and source_hash URLs can
gain full file system access as root on a salt minion.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-25282&lt;/p&gt;
&lt;p&gt;The salt.wheel.pillar_roots.write method is vulnerable to
directory traversal.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-25283&lt;/p&gt;
&lt;p&gt;The jinja renderer does not protect against server side template
injection attacks.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-25284&lt;/p&gt;
&lt;p&gt;salt.modules.cmdmod can log credentials to the info or error log
level.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-536-1 lxml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-536-1-lxml/</link>
      <pubDate>Sat, 01 Jan 2022 12:02:26 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-536-1-lxml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-536-1-lxml/">
      
&lt;p&gt;Package : lxml&lt;/p&gt;


&lt;p&gt;Version : 3.4.0-1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43818&#34;&gt;CVE-2021-43818&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;lxml is a library for processing XML and HTML in the Python language.
Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain
crafted script content pass through, as well as script content in
SVG files embedded using data URIs.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-535-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-535-1-linux-4.9/</link>
      <pubDate>Thu, 30 Dec 2021 11:55:44 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-535-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-535-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.290-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-3702&#34;&gt;CVE-2020-3702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16119&#34;&gt;CVE-2020-16119&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0920&#34;&gt;CVE-2021-0920&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3612&#34;&gt;CVE-2021-3612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3653&#34;&gt;CVE-2021-3653&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3655&#34;&gt;CVE-2021-3655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3679&#34;&gt;CVE-2021-3679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3732&#34;&gt;CVE-2021-3732&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3753&#34;&gt;CVE-2021-3753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3760&#34;&gt;CVE-2021-3760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20317&#34;&gt;CVE-2021-20317&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20321&#34;&gt;CVE-2021-20321&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20322&#34;&gt;CVE-2021-20322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22543&#34;&gt;CVE-2021-22543&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37159&#34;&gt;CVE-2021-37159&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38160&#34;&gt;CVE-2021-38160&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38198&#34;&gt;CVE-2021-38198&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38199&#34;&gt;CVE-2021-38199&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38204&#34;&gt;CVE-2021-38204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38205&#34;&gt;CVE-2021-38205&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40490&#34;&gt;CVE-2021-40490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41864&#34;&gt;CVE-2021-41864&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42008&#34;&gt;CVE-2021-42008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42739&#34;&gt;CVE-2021-42739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43389&#34;&gt;CVE-2021-43389&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2020-3702&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the driver for Atheros IEEE 802.11n family of
chipsets (ath9k) allowing information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-16119&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hadar Manor reported a use-after-free in the DCCP protocol
implementation in the Linux kernel. A local attacker can take
advantage of this flaw to cause a denial of service or potentially
to execute arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-0920&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the local sockets (AF_UNIX)
subsystem, which could lead to a use-after-free.  A local user
could exploit this for denial of service (memory corruption or
crash), or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3612&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Murray McAllister reported a flaw in the joystick input subsystem.
A local user permitted to access a joystick device could exploit
this to read and write out-of-bounds in the kernel, which could
be used for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3653&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Maxim Levitsky discovered a vulnerability in the KVM hypervisor
implementation for AMD processors in the Linux kernel: Missing
validation of the `int_ctl` VMCB field could allow a malicious L1
guest to enable AVIC support (Advanced Virtual Interrupt
Controller) for the L2 guest. The L2 guest can take advantage of
this flaw to write to a limited but still relatively large subset
of the host physical memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ilja Van Sprundel and Marcelo Ricardo Leitner found multiple flaws
in the SCTP implementation, where missing validation could lead to
an out-of-bounds read.  On a system using SCTP, a networked
attacker could exploit these to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3679&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw in the Linux kernel tracing module functionality could
allow a privileged local user (with CAP_SYS_ADMIN capability) to
cause a denial of service (resource starvation).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3732&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Alois Wohlschlager reported a flaw in the implementation of the
overlayfs subsystem, allowing a local attacker with privileges to
mount a filesystem to reveal files hidden in the original mount.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Minh Yuan reported a race condition in the vt_k_ioctl in
drivers/tty/vt/vt_ioctl.c, which may cause an out of bounds read
in vt.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3760&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Lin Horse reported a flaw in the NCI (NFC Controller Interface)
driver, which could lead to a use-after-free.

However, this driver is not included in the binary packages
provided by Debian.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20317&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the timer queue structure could become
corrupt, leading to waiting tasks never being woken up.  A local
user with certain privileges could exploit this to cause a denial
of service (system hang).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20321&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the overlayfs filesystem
driver.  A local user with access to an overlayfs mount and to its
underlying upper directory could exploit this for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20322&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An information leak was discovered in the IPv4 implementation.  A
remote attacker could exploit this to quickly discover which UDP
ports a system is using, making it easier for them to carry out a
DNS poisoning attack against that system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-22543&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Stevens discovered a flaw in how the KVM hypervisor maps
host memory into a guest.  A local user permitted to access
/dev/kvm could use this to cause certain pages to be freed when
they should not, leading to a use-after-free.  This could be used
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37159&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the hso driver for Option mobile
broadband modems.  An error during initialisation could lead to a
double-free or use-after-free.  An attacker able to plug in USB
devices could use this to cause a denial of service (crash or
memory corruption) or possibly to run arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38160&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw in the virtio_console was discovered allowing data
corruption or data loss by an untrusted device.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38198&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the KVM implementation for x86
processors, that could result in virtual memory protection within
a guest not being applied correctly.  When shadow page tables are
used - i.e. for nested virtualisation, or on CPUs lacking the EPT
or NPT feature - a user of the guest OS might be able to exploit
this for denial of service or privilege escalation within the
guest.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38199&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Michael Wakabayashi reported a flaw in the NFSv4 client
implementation, where incorrect connection setup ordering allows
operations of a remote NFSv4 server to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the max4321-hcd USB host controller
driver, which could lead to a use-after-free.

However, this driver is not included in the binary packages
provided by Debian.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-38205&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An information leak was discovered in the xilinx_emaclite network
driver.  On a custom kernel where this driver is enabled and used,
this might make it easier to exploit other kernel bugs.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-40490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the ext4 subsystem when writing
to an inline_data file while its xattrs are changing. This could
result in denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-41864&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow was discovered in the Extended BPF (eBPF)
subsystem.  A local user could exploit this for denial of service
(memory corruption or crash), or possibly for privilege
escalation.

This can be mitigated by setting sysctl
kernel.unprivileged_bpf_disabled=1, which disables eBPF use by
unprivileged users.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42008&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow was discovered in the 6pack serial port
network driver.  A local user with CAP_NET_ADMIN capability could
exploit this for denial of service (memory corruption or crash), or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-42739&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow was discovered in the firedtv driver for
FireWire-connected DVB receivers.  A local user with access to a
firedtv device could exploit this for denial of service (memory
corruption or crash), or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-43389&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Active Defense Lab of Venustech discovered a flaw in the CMTP
subsystem as used by Bluetooth, which could lead to an
out-of-bounds read and object type confusion.  A local user with
CAP_NET_ADMIN capability in the initial user namespace could
exploit this for denial of service (memory corruption or crash),
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-534-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-534-1-xorg-server/</link>
      <pubDate>Wed, 29 Dec 2021 22:58:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-534-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-534-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4008&#34;&gt;CVE-2021-4008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4009&#34;&gt;CVE-2021-4009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-4011&#34;&gt;CVE-2021-4011&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered that multiple input validation failures in X server extensions
of the X.org X server may result in privilege escalation if the X server is running privileged.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-533-1 python-gnupg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-533-1-python-gnupg/</link>
      <pubDate>Wed, 29 Dec 2021 02:48:06 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-533-1-python-gnupg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-533-1-python-gnupg/">
      
&lt;p&gt;Package : python-gnupg&lt;/p&gt;


&lt;p&gt;Version : 0.3.6-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12020&#34;&gt;CVE-2018-12020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Marcus Brinkmann discovered that GnuPG before 2.2.8 improperly handled certain
command line parameters. A remote attacker could use this to spoof the output of
GnuPG and cause unsigned e-mail to appear signed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-532-1 zziplib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-532-1-zziplib/</link>
      <pubDate>Tue, 28 Dec 2021 00:52:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-532-1-zziplib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-532-1-zziplib/">
      
&lt;p&gt;Package : zziplib&lt;/p&gt;


&lt;p&gt;Version : 0.13.62-3&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-18442&#34;&gt;CVE-2020-18442&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in zziplib, a library providing read access on
ZIP-archive.
Because of mishandling a return value, an attacker might cause a denial of
service due to an infinite loop.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-531-1 ruby2.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-531-1-ruby2.1/</link>
      <pubDate>Mon, 27 Dec 2021 06:13:40 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-531-1-ruby2.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-531-1-ruby2.1/">
      
&lt;p&gt;Package : ruby2.1&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-2&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41817&#34;&gt;CVE-2021-41817&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41819&#34;&gt;CVE-2021-41819&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A cookie prefix spoofing vulnerability in CGI::Cookie.parse and a
regular expression denial of service vulnerability (ReDoS) on date
parsing methods was discovered in src:ruby2.1, the Ruby interpreter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-530-1 systemd bug fix</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-530-1-systemd/</link>
      <pubDate>Mon, 27 Dec 2021 01:28:58 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-530-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-530-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 215-17&amp;#43;deb8u14&lt;/p&gt;


      &lt;p&gt;&lt;code&gt;systemd-shutdown&lt;/code&gt; is run after the network is stopped, so remounting
a network filesystem read-only can hang. A simple umount is the most
useful thing that can be done for a network filesystem once the
network is down.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-529-1 ufraw security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-529-1-ufraw/</link>
      <pubDate>Fri, 24 Dec 2021 02:10:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-529-1-ufraw/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-529-1-ufraw/">
      
&lt;p&gt;Package : ufraw&lt;/p&gt;


&lt;p&gt;Version : 0.20-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-8366&#34;&gt;CVE-2015-8366&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in ufraw, a standalone importer for raw camera images.
Due to an array index error in smal_decode_segment() an attacker might be able to cause memory errors and possibly execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-528-1 raptor2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-528-1-raptor2/</link>
      <pubDate>Tue, 14 Dec 2021 00:29:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-528-1-raptor2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-528-1-raptor2/">
      
&lt;p&gt;Package : raptor2&lt;/p&gt;


&lt;p&gt;Version : 2.0.14-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25713&#34;&gt;CVE-2020-25713&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in raptor2, a Raptor RDF parser and serializer
library. Malformed input file can lead to a segfault.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-527-1 libsamplerate security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-527-1-libsamplerate/</link>
      <pubDate>Tue, 14 Dec 2021 00:22:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-527-1-libsamplerate/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-527-1-libsamplerate/">
      
&lt;p&gt;Package : libsamplerate&lt;/p&gt;


&lt;p&gt;Version : 0.1.8-8&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7697&#34;&gt;CVE-2017-7697&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libsamplerate, an audio sample rate conversion
library. Using a crafted audio file a buffer over-read might happen in
calc_output_single() in src_sinc.c.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-525-2 nss regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-525-2-nss/</link>
      <pubDate>Wed, 08 Dec 2021 04:46:08 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-525-2-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-525-2-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u15&lt;/p&gt;


      &lt;p&gt;ELA-525-1 was rolled out, fixing CVE-2021-43527 in nss, but that
lead to a regression, preventing SSL connections in Chromium. The
complete bug report could be found here:
&lt;a href=&#34;https://bugs.debian.org/1001219&#34;&gt;https://bugs.debian.org/1001219&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-526-1 opensc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-526-1-opensc/</link>
      <pubDate>Tue, 07 Dec 2021 10:00:52 -0800</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-526-1-opensc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-526-1-opensc/">
      
&lt;p&gt;Package : opensc&lt;/p&gt;


&lt;p&gt;Version : 0.16.0-3&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26570&#34;&gt;CVE-2020-26570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26571&#34;&gt;CVE-2020-26571&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26572&#34;&gt;CVE-2020-26572&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in opensc, a set of utilities to
interact with smartcard devices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CVE-2020-26570: Heap-based buffer overflow in &lt;code&gt;sc_oberthur_read_file&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;CVE-2020-26571: Stack-based buffer overflow in &lt;code&gt;sc_pkcs15emu_gemsafeGPK_init&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;CVE-2020-26572: Stack-based buffer overflow in &lt;code&gt;tcos_decipher&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-525-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-525-1-nss/</link>
      <pubDate>Thu, 02 Dec 2021 18:15:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-525-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-525-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43527&#34;&gt;CVE-2021-43527&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Tavis Ormandy discovered that nss, the Mozilla Network Security Service
library, is prone to a heap overflow flaw when verifying DSA or RSA-PPS
signatures, which could result in denial of service or potentially the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-524-1 gmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-524-1-gmp/</link>
      <pubDate>Tue, 30 Nov 2021 02:57:05 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-524-1-gmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-524-1-gmp/">
      
&lt;p&gt;Package : gmp&lt;/p&gt;


&lt;p&gt;Version : 2:6.0.0&amp;#43;dfsg-6&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-43618&#34;&gt;CVE-2021-43618&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;GNU Multiple Precision Arithmetic Library (GMP) through
6.2.1 has an mpz/inp_raw.c integer overflow and resultant
buffer overflow via crafted input, leading to a
segmentation fault on 32-bit platforms.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-523-1 ntfs-3g security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-523-1-ntfs-3g/</link>
      <pubDate>Tue, 30 Nov 2021 01:46:01 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-523-1-ntfs-3g/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-523-1-ntfs-3g/">
      
&lt;p&gt;Package : ntfs-3g&lt;/p&gt;


&lt;p&gt;Version : 1:2014.2.15AR.2-1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33285&#34;&gt;CVE-2021-33285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33286&#34;&gt;CVE-2021-33286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33287&#34;&gt;CVE-2021-33287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33289&#34;&gt;CVE-2021-33289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35266&#34;&gt;CVE-2021-35266&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35267&#34;&gt;CVE-2021-35267&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35268&#34;&gt;CVE-2021-35268&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35269&#34;&gt;CVE-2021-35269&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39251&#34;&gt;CVE-2021-39251&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39252&#34;&gt;CVE-2021-39252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39253&#34;&gt;CVE-2021-39253&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39254&#34;&gt;CVE-2021-39254&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39255&#34;&gt;CVE-2021-39255&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39256&#34;&gt;CVE-2021-39256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39257&#34;&gt;CVE-2021-39257&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39258&#34;&gt;CVE-2021-39258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39259&#34;&gt;CVE-2021-39259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39260&#34;&gt;CVE-2021-39260&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39261&#34;&gt;CVE-2021-39261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39262&#34;&gt;CVE-2021-39262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39263&#34;&gt;CVE-2021-39263&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in NTFS-3G, a read-write NTFS
driver for FUSE. A local user can take advantage of these flaws for
local root privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-522-1 bluez security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-522-1-bluez/</link>
      <pubDate>Sat, 27 Nov 2021 12:13:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-522-1-bluez/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-522-1-bluez/">
      
&lt;p&gt;Package : bluez&lt;/p&gt;


&lt;p&gt;Version : 5.43-2&amp;#43;deb9u2~deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8921&#34;&gt;CVE-2019-8921&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8922&#34;&gt;CVE-2019-8922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41229&#34;&gt;CVE-2021-41229&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in BlueZ, the Linux Bluetooth
protocol stack. An attacker could cause a denial-of-service (DoS) or
leak information.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-8921&lt;/p&gt;
&lt;p&gt;SDP infoleak; the vulnerability lies in the handling of a
SVC_ATTR_REQ by the SDP implementation of BlueZ. By crafting a
malicious CSTATE, it is possible to trick the server into
returning more bytes than the buffer actually holds, resulting in
leaking arbitrary heap data.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-8922&lt;/p&gt;
&lt;p&gt;SDP Heap Overflow; this vulnerability lies in the SDP protocol
handling of attribute requests as well. By requesting a huge
number of attributes at the same time, an attacker can overflow
the static buffer provided to hold the response.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-41229&lt;/p&gt;
&lt;p&gt;sdp_cstate_alloc_buf allocates memory which will always be hung in
the singly linked list of cstates and will not be freed. This will
cause a memory leak over time. The data can be a very large
object, which can be caused by an attacker continuously sending
sdp packets and this may cause the service of the target device to
crash.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-521-1 libmodbus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-521-1-libmodbus/</link>
      <pubDate>Mon, 22 Nov 2021 16:52:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-521-1-libmodbus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-521-1-libmodbus/">
      
&lt;p&gt;Package : libmodbus&lt;/p&gt;


&lt;p&gt;Version : 3.0.6-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14462&#34;&gt;CVE-2019-14462&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14463&#34;&gt;CVE-2019-14463&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in libmodbus, a library for the Modbus protocol.
Both issues are related to out of bound reads, which could result in a denial of service or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-520-1 libsdl1.2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-520-1-libsdl1.2/</link>
      <pubDate>Sun, 21 Nov 2021 17:04:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-520-1-libsdl1.2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-520-1-libsdl1.2/">
      
&lt;p&gt;Package : libsdl1.2&lt;/p&gt;


&lt;p&gt;Version : 1.2.15-10&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13616&#34;&gt;CVE-2019-13616&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libsdl1.2, a library for portable low
level access to a video framebuffer, audio output, mouse, and keyboard.
It is related to an heap-based buffer over-read, resulting in a DoS by
using a crafted BMP file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-519-1 qtbase-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-519-1-qtbase-opensource-src/</link>
      <pubDate>Sat, 20 Nov 2021 18:55:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-519-1-qtbase-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-519-1-qtbase-opensource-src/">
      
&lt;p&gt;Package : qtbase-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.3.2&amp;#43;dfsg-4&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19872&#34;&gt;CVE-2018-19872&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A malformed PPM file could crash the application by generating a division by zero.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-518-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-518-1-postgresql-9.4/</link>
      <pubDate>Thu, 18 Nov 2021 16:34:23 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-518-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-518-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23214&#34;&gt;CVE-2021-23214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23222&#34;&gt;CVE-2021-23222&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jacob Champion discovered that PostgreSQL, an object-relational SQL
database, may process unencrypted bytes from a database connection
even if it is encrypted. A man-in-the-middle attacker can inject
arbitrary SQL queries when a connection is first established.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-23214&lt;/p&gt;
&lt;p&gt;Server processes unencrypted bytes from man-in-the-middle - when
the server is configured to use trust authentication with a
clientcert requirement or to use cert authentication, a
man-in-the-middle attacker can inject arbitrary SQL queries when a
connection is first established, despite the use of SSL
certificate verification and encryption.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-23222&lt;/p&gt;
&lt;p&gt;libpq processes unencrypted bytes from man-in-the-middle - a
man-in-the-middle attacker can inject false responses to the
client&amp;rsquo;s first few queries, despite the use of SSL certificate
verification and encryption. If more preconditions hold, the
attacker can exfiltrate the client&amp;rsquo;s password or other
confidential data that might be transmitted early in a
session. The attacker must have a way to trick the client&amp;rsquo;s
intended server into making the confidential data accessible to
the attacker. A known implementation having that property is a
PostgreSQL configuration vulnerable to CVE-2021-23214.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-517-1 atftp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-517-1-atftp/</link>
      <pubDate>Wed, 17 Nov 2021 01:32:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-517-1-atftp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-517-1-atftp/">
      
&lt;p&gt;Package : atftp&lt;/p&gt;


&lt;p&gt;Version : 0.7.git20120829-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-6097&#34;&gt;CVE-2020-6097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41054&#34;&gt;CVE-2021-41054&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in atftp, an advanced TFTP client.
Both are related to sending crafted requests to the server and triggering
a denial-of-service due to for example a buffer overflow.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-516-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-516-1-openjdk-7/</link>
      <pubDate>Thu, 11 Nov 2021 10:18:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-516-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-516-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u321-2.6.28-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35550&#34;&gt;CVE-2021-35550&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35556&#34;&gt;CVE-2021-35556&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35559&#34;&gt;CVE-2021-35559&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35561&#34;&gt;CVE-2021-35561&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35564&#34;&gt;CVE-2021-35564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35565&#34;&gt;CVE-2021-35565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35586&#34;&gt;CVE-2021-35586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35588&#34;&gt;CVE-2021-35588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35603&#34;&gt;CVE-2021-35603&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, which may result in denial of service, selection of weak ciphers,
sandbox bypass or information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-515-1 jqueryui security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-515-1-jqueryui/</link>
      <pubDate>Thu, 11 Nov 2021 10:07:50 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-515-1-jqueryui/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-515-1-jqueryui/">
      
&lt;p&gt;Package : jqueryui&lt;/p&gt;


&lt;p&gt;Version : 1.10.1&amp;#43;dfsg-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-7103&#34;&gt;CVE-2016-7103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41182&#34;&gt;CVE-2021-41182&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41183&#34;&gt;CVE-2021-41183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41184&#34;&gt;CVE-2021-41184&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several cross-site scripting (XSS) vulnerabilities have been found in
jqueryui, a JavaScript UI library for dynamic web applications, which
could allow attackers with sufficient access to inject arbitrary
code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-514-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-514-1-openjdk-8/</link>
      <pubDate>Tue, 09 Nov 2021 14:02:27 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-514-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-514-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u312-b07-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35550&#34;&gt;CVE-2021-35550&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35556&#34;&gt;CVE-2021-35556&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35559&#34;&gt;CVE-2021-35559&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35561&#34;&gt;CVE-2021-35561&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35564&#34;&gt;CVE-2021-35564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35565&#34;&gt;CVE-2021-35565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35567&#34;&gt;CVE-2021-35567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35578&#34;&gt;CVE-2021-35578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35586&#34;&gt;CVE-2021-35586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35588&#34;&gt;CVE-2021-35588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-35603&#34;&gt;CVE-2021-35603&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
including issues with cyprographic hashing, TLS client handshaking, and
various other issues.&lt;/p&gt;
&lt;p&gt;Thanks to Thorsten Glaser and ⮡ tarent for contributing the updated
packages to address these vulnerabilities.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-513-1 ckeditor security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-513-1-ckeditor/</link>
      <pubDate>Tue, 09 Nov 2021 14:33:58 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-513-1-ckeditor/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-513-1-ckeditor/">
      
&lt;p&gt;Package : ckeditor&lt;/p&gt;


&lt;p&gt;Version : 4.4.4&amp;#43;dfsg1-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33829&#34;&gt;CVE-2021-33829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-37695&#34;&gt;CVE-2021-37695&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CKEditor, an open source WYSIWYG HTML editor with rich content
support, which can be embedded into web pages, had two
vulnerabilities as follows:&lt;/p&gt;
&lt;p&gt;CVE-2021-33829&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A cross-site scripting (XSS) vulnerability in the HTML Data
Processor in CKEditor 4 allows remote attackers to inject
executable JavaScript code through a crafted comment because
--!&amp;gt; is mishandled.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-37695&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential vulnerability has been discovered in CKEditor 4
Fake Objects package. The vulnerability allowed to inject
malformed Fake Objects HTML, which could result in executing
JavaScript code.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-512-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-512-1-redis/</link>
      <pubDate>Sat, 06 Nov 2021 09:39:57 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-512-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-512-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32672&#34;&gt;CVE-2021-32672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32687&#34;&gt;CVE-2021-32687&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32675&#34;&gt;CVE-2021-32675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32626&#34;&gt;CVE-2021-32626&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A number of vulnerabilities were discovered in Redis, a popular key/value database:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-32672: Random heap reading issue with Lua Debugger.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-32687: Integer to heap buffer overflow with intsets, when
set-max-intset-entries is manually configured to a non-default, very large
value.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-32675: Denial Of Service when processing RESP request payloads
with a large number of elements on many connections.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-32626: Specially crafted Lua scripts may result with Heap
buffer overflow.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-510-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-510-1-python3.4/</link>
      <pubDate>Fri, 05 Nov 2021 14:43:58 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-510-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-510-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3426&#34;&gt;CVE-2021-3426&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3733&#34;&gt;CVE-2021-3733&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3737&#34;&gt;CVE-2021-3737&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There were a couple of vulnerabilities found in src:python3.4, the
Python interpreter v3.4, and are as follows:&lt;/p&gt;
&lt;p&gt;CVE-2021-3426&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Running `pydoc -p` allows other local users to extract
arbitrary files. The `/getfile?key=path` URL allows to read
arbitrary file on the filesystem.

The fix removes the &amp;quot;getfile&amp;quot; feature of the pydoc module which
could be abused to read arbitrary files on the disk (directory
traversal vulnerability).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3733&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The ReDoS-vulnerable regex has quadratic worst-case complexity
and it allows cause a denial of service when identifying
crafted invalid RFCs. This ReDoS issue is on the client side
and needs remote attackers to control the HTTP server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3737&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;HTTP client can get stuck infinitely reading len(line) &amp;lt; 64k
lines after receiving a &#39;100 Continue&#39; HTTP response. This
could lead to the client being a bandwidth sink for anyone
in control of a server.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-511-1 udisks2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-511-1-udisks2/</link>
      <pubDate>Fri, 05 Nov 2021 09:56:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-511-1-udisks2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-511-1-udisks2/">
      
&lt;p&gt;Package : udisks2&lt;/p&gt;


&lt;p&gt;Version : 2.1.3-5&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3802&#34;&gt;CVE-2021-3802&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Stefan Walter found that udisks2, a service to access and manipulate
storage devices, could cause denial of service via system crash if a
corrupted or specially crafted ext2/3/4 device or image was mounted,
which could happen automatically on certain environments.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-509-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-509-1-bind9/</link>
      <pubDate>Tue, 02 Nov 2021 01:53:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-509-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-509-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u23&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25219&#34;&gt;CVE-2021-25219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Kishore Kumar Kothapalli discovered that the lame server cache in BIND, a DNS
server implementation, can be abused by an attacker to significantly degrade
resolver performance, resulting in denial of service (large delays for
responses for client queries and DNS timeouts on client hosts).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-508-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-508-1-cups/</link>
      <pubDate>Sun, 31 Oct 2021 00:33:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-508-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-508-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.7.5-11&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10001&#34;&gt;CVE-2020-10001&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in cups, the Common UNIX Printing System.
Due to an input validation issue a malicious application might be allowed
to read restricted memory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-507-1 opencv security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-507-1-opencv/</link>
      <pubDate>Sat, 30 Oct 2021 16:43:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-507-1-opencv/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-507-1-opencv/">
      
&lt;p&gt;Package : opencv&lt;/p&gt;


&lt;p&gt;Version : 2.4.9.1&amp;#43;dfsg-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14493&#34;&gt;CVE-2019-14493&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15939&#34;&gt;CVE-2019-15939&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been addressed in OpenCV, the Open Computer
Vision Library. A NULL pointer dereference and a divide-by-zero error may lead
to a denial-of-service if malformed input is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-506-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-506-1-libdatetime-timezone-perl/</link>
      <pubDate>Fri, 29 Oct 2021 12:08:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-506-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-506-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2021e&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2021e for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-505-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-505-1-tzdata/</link>
      <pubDate>Fri, 29 Oct 2021 12:03:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-505-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-505-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u2&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2021e. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fiji suspends DST for the 2021/2022 season.&lt;/li&gt;
&lt;li&gt;Palestine falls back 2021-10-29 (not 2021-10-30) at 01:00.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-504-1 jbig2dec security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-504-1-jbig2dec/</link>
      <pubDate>Fri, 29 Oct 2021 01:04:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-504-1-jbig2dec/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-504-1-jbig2dec/">
      
&lt;p&gt;Package : jbig2dec&lt;/p&gt;


&lt;p&gt;Version : 0.13-4~deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9216&#34;&gt;CVE-2017-9216&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12268&#34;&gt;CVE-2020-12268&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in jbig2dec, a JBIG2 decoder library.
One is related to an overflow with a crafted image file. The other is related to a NULL pointer dereference.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-503-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-503-1-php5/</link>
      <pubDate>Wed, 27 Oct 2021 12:48:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-503-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-503-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u15&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21703&#34;&gt;CVE-2021-21703&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out-of-bounds read and write flaw was discovered in the PHP-FPM
code, which could result in escalation of privileges from local
unprivileged user to the root user.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-502-1 phpldapadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-502-1-phpldapadmin/</link>
      <pubDate>Mon, 25 Oct 2021 11:32:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-502-1-phpldapadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-502-1-phpldapadmin/">
      
&lt;p&gt;Package : phpldapadmin&lt;/p&gt;


&lt;p&gt;Version : 1.2.2-5.2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35132&#34;&gt;CVE-2020-35132&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An XSS security vulnerability has been discovered in phpLDAPadmin, a web based
interface for administering LDAP servers, that allows users to store malicious
values that may be executed by other users at a later time.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-501-1 faad2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-501-1-faad2/</link>
      <pubDate>Sun, 24 Oct 2021 17:40:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-501-1-faad2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-501-1-faad2/">
      
&lt;p&gt;Package : faad2&lt;/p&gt;


&lt;p&gt;Version : 2.7-8&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32274&#34;&gt;CVE-2021-32274&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32276&#34;&gt;CVE-2021-32276&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32277&#34;&gt;CVE-2021-32277&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32278&#34;&gt;CVE-2021-32278&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in faad2, a freeware Advanced Audio Decoder
player. They are related to heap buffer overflows or null pointer
dereferences, which both might allow an attacker to execute code by
providing crafted files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-500-1 mailman security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-500-1-mailman/</link>
      <pubDate>Sat, 23 Oct 2021 17:55:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-500-1-mailman/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-500-1-mailman/">
      
&lt;p&gt;Package : mailman&lt;/p&gt;


&lt;p&gt;Version : 1:2.1.18-2&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42096&#34;&gt;CVE-2021-42096&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-42097&#34;&gt;CVE-2021-42097&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential remote privilege
escalation vulnerability in the Mailman mailing list manager.&lt;/p&gt;
&lt;p&gt;Some CSRF token values were derived from the admin password, and that
could have been used to conductg a brute-force attack against that
password.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-499-1 hiredis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-499-1-hiredis/</link>
      <pubDate>Sat, 23 Oct 2021 17:18:24 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-499-1-hiredis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-499-1-hiredis/">
      
&lt;p&gt;Package : hiredis&lt;/p&gt;


&lt;p&gt;Version : 0.11.0-4&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32765&#34;&gt;CVE-2021-32765&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an integer-overflow vulnerability in hiredis,
a C client library for communicating with Redis databases. This occurred
within the handling and parsing of &amp;lsquo;multi-bulk&amp;rsquo; replies.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-498-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-498-1-openssl/</link>
      <pubDate>Sat, 23 Oct 2021 00:18:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-498-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-498-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u16&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3712&#34;&gt;CVE-2021-3712&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in openssl, a Secure Sockets Layer toolkit. Ingo Schwarze reported a buffer overrun flaw when processing ASN.1 strings, which can result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-497-1 squashfs-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-497-1-squashfs-tools/</link>
      <pubDate>Thu, 21 Oct 2021 08:55:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-497-1-squashfs-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-497-1-squashfs-tools/">
      
&lt;p&gt;Package : squashfs-tools&lt;/p&gt;


&lt;p&gt;Version : 1:4.2&amp;#43;20130409-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-41072&#34;&gt;CVE-2021-41072&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Richard Weinberger reported that unsquashfs in squashfs-tools, the tools to create and extract Squashfs filesystems, does not check for duplicate filenames within a directory. An attacker can take advantage of this flaw for writing to arbitrary files to the filesystem if a malformed Squashfs image is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-487-2 uwsgi regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-487-2-uwsgi/</link>
      <pubDate>Wed, 20 Oct 2021 19:09:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-487-2-uwsgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-487-2-uwsgi/">
      
&lt;p&gt;Package : uwsgi&lt;/p&gt;


&lt;p&gt;Version : 2.0.7-1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36160&#34;&gt;CVE-2021-36160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A regression was introduced in ELA-487-1, where the uwsgi proxy module
for Apache2 (mod_proxy_uwsgi) interprets incorrect Apache
configurations in a less forgiving way, causing existing setups to
fail after upgrade.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-496-1 icu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-496-1-icu/</link>
      <pubDate>Tue, 12 Oct 2021 11:54:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-496-1-icu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-496-1-icu/">
      
&lt;p&gt;Package : icu&lt;/p&gt;


&lt;p&gt;Version : 52.1-8&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21913&#34;&gt;CVE-2020-21913&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential use-after-free vulnerability in
icu, a library which provides Unicode and locale functionality.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-495-1 ruby2.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-495-1-ruby2.1/</link>
      <pubDate>Mon, 11 Oct 2021 11:24:06 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-495-1-ruby2.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-495-1-ruby2.1/">
      
&lt;p&gt;Package : ruby2.1&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-2&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31799&#34;&gt;CVE-2021-31799&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31810&#34;&gt;CVE-2021-31810&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32066&#34;&gt;CVE-2021-32066&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities in ruby2.1, interpreter of object-oriented
scripting language Ruby, were discovered.&lt;/p&gt;
&lt;p&gt;CVE-2021-31799&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In RDoc 3.11 through 6.x before 6.3.1, as distributed with
Ruby through 2.1.5, it is possible to execute arbitrary
code via | and tags in a filename.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-31810&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Ruby through 2.1.5. A malicious
FTP server can use the PASV response to trick Net::FTP into
connecting back to a given IP address and port. This
potentially makes curl extract information about services
that are otherwise private and not disclosed (e.g., the
attacker can conduct port scans and service banner extractions).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-32066&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in Ruby through 2.1.5. Net::IMAP does
not raise an exception when StartTLS fails with an an unknown
response, which might allow man-in-the-middle attackers to
bypass the TLS protections by leveraging a network position
between the client and the registry to block the StartTLS
command, aka a &amp;quot;StartTLS stripping attack.&amp;quot;
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-494-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-494-1-curl/</link>
      <pubDate>Sat, 09 Oct 2021 11:07:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-494-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-494-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22946&#34;&gt;CVE-2021-22946&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22947&#34;&gt;CVE-2021-22947&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in curl, a command line tool and an easy-to-use client-side library for transferring data with URL syntax.&lt;/p&gt;
&lt;p&gt;CVE-2021-22946
Crafted answers from a server might force clients to not use TLS on
connections though TLS was required and expected.&lt;/p&gt;
&lt;p&gt;CVE-2021-22947
When using STARTTLS to initiate a TLS connection, the server might
send multiple answers before the TLS upgrade and such the client
would handle them as being trusted. This could be used by a
MITM-attacker to inject fake response data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-493-1 transfig security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-493-1-transfig/</link>
      <pubDate>Tue, 05 Oct 2021 16:23:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-493-1-transfig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-493-1-transfig/">
      
&lt;p&gt;Package : transfig&lt;/p&gt;


&lt;p&gt;Version : 1:3.2.6a-2~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19797&#34;&gt;CVE-2019-19797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21529&#34;&gt;CVE-2020-21529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21530&#34;&gt;CVE-2020-21530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21531&#34;&gt;CVE-2020-21531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21532&#34;&gt;CVE-2020-21532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21533&#34;&gt;CVE-2020-21533&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21534&#34;&gt;CVE-2020-21534&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21535&#34;&gt;CVE-2020-21535&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-21675&#34;&gt;CVE-2020-21675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3561&#34;&gt;CVE-2021-3561&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32280&#34;&gt;CVE-2021-32280&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in transfig, utilities
for converting XFig figure files. Buffer overflows, out-of-bounds reads and
NULL pointer dereferences could lead to a denial-of-service or other
unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-492-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-492-1-tiff/</link>
      <pubDate>Sun, 03 Oct 2021 05:04:29 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-492-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-492-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-19131&#34;&gt;CVE-2020-19131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-19144&#34;&gt;CVE-2020-19144&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security issues were found in TIFF, a widely used
format for storing image data, as follows:&lt;/p&gt;
&lt;p&gt;CVE-2020-19131&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer Overflow in LibTiff allows attackers to cause
a denial of service via the &amp;quot;invertImage()&amp;quot; function
in the component &amp;quot;tiffcrop&amp;quot;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-19144&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Buffer Overflow in LibTiff allows attackers to cause
a denial of service via the &#39;in _TIFFmemcpy&#39; funtion
in the component &#39;tif_unix.c&#39;.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-491-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-491-1-apache2/</link>
      <pubDate>Sat, 02 Oct 2021 17:22:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-491-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-491-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-34798&#34;&gt;CVE-2021-34798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39275&#34;&gt;CVE-2021-39275&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40438&#34;&gt;CVE-2021-40438&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Apache HTTP server.
An attacker could send proxied requests to arbitrary servers, corrupt
memory in some setups involving third-party modules, and cause the
server to crash.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-34798&lt;/p&gt;
&lt;p&gt;Malformed requests may cause the server to dereference
a NULL pointer.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-39275&lt;/p&gt;
&lt;p&gt;ap_escape_quotes() may write beyond the end of a buffer when given
malicious input. No included modules pass untrusted data to these
functions, but third-party / external modules may.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-40438&lt;/p&gt;
&lt;p&gt;A crafted request uri-path can cause mod_proxy to forward the
request to an origin server choosen by the remote user.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-490-1 nghttp2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-490-1-nghttp2/</link>
      <pubDate>Fri, 01 Oct 2021 20:43:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-490-1-nghttp2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-490-1-nghttp2/">
      
&lt;p&gt;Package : nghttp2&lt;/p&gt;


&lt;p&gt;Version : 0.6.4-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11080&#34;&gt;CVE-2020-11080&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An overly large HTTP/2 SETTINGS frame payload causes denial of service. The
proof of concept attack involves a malicious client constructing a SETTINGS
frame with a length of 14,400 bytes (2400 individual settings entries) over and
over again. The attack causes the CPU to spike at 100%.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-489-1 weechat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-489-1-weechat/</link>
      <pubDate>Thu, 30 Sep 2021 23:52:24 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-489-1-weechat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-489-1-weechat/">
      
&lt;p&gt;Package : weechat&lt;/p&gt;


&lt;p&gt;Version : 1.0.1-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40516&#34;&gt;CVE-2021-40516&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A crafted WebSocket frame could result in a crash in the Relay plugin
of the chat client WeeChat.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-488-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-488-1-libxstream-java/</link>
      <pubDate>Thu, 30 Sep 2021 14:24:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-488-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-488-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39139&#34;&gt;CVE-2021-39139&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39140&#34;&gt;CVE-2021-39140&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39141&#34;&gt;CVE-2021-39141&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39144&#34;&gt;CVE-2021-39144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39145&#34;&gt;CVE-2021-39145&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39146&#34;&gt;CVE-2021-39146&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39147&#34;&gt;CVE-2021-39147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39148&#34;&gt;CVE-2021-39148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39149&#34;&gt;CVE-2021-39149&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39150&#34;&gt;CVE-2021-39150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39151&#34;&gt;CVE-2021-39151&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39152&#34;&gt;CVE-2021-39152&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39153&#34;&gt;CVE-2021-39153&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-39154&#34;&gt;CVE-2021-39154&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities have been discovered in XStream, a Java
library to serialize objects to XML and back again.&lt;/p&gt;
&lt;p&gt;These vulnerabilities may allow a remote attacker to load and execute arbitrary
code from a remote host only by manipulating the processed input stream.&lt;/p&gt;
&lt;p&gt;XStream itself sets up a whitelist by default now, i.e. it blocks all classes
except those types it has explicit converters for. It used to have a blacklist
by default, i.e. it tried to block all currently known critical classes of the
Java runtime. Main reason for the blacklist were compatibility, it allowed to
use newer versions of XStream as drop-in replacement. However, this approach
has failed. A growing list of security reports has proven, that a blacklist is
inherently unsafe, apart from the fact that types of 3rd libraries were not
even considered. A blacklist scenario should be avoided in general, because it
provides a false sense of security.&lt;/p&gt;
&lt;p&gt;See also &lt;a href=&#34;https://x-stream.github.io/security.html#framework&#34;&gt;https://x-stream.github.io/security.html#framework&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-487-1 uwsgi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-487-1-uwsgi/</link>
      <pubDate>Wed, 29 Sep 2021 21:06:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-487-1-uwsgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-487-1-uwsgi/">
      
&lt;p&gt;Package : uwsgi&lt;/p&gt;


&lt;p&gt;Version : 2.0.7-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-36160&#34;&gt;CVE-2021-36160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the uwsgi proxy module for Apache2
(mod_proxy_uwsgi) can read above the allocated memory when processing
a request with a carefully crafted uri-path. An attacker may cause the
server to crash (DoS).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-486-1 gst-plugins-bad0.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-486-1-gst-plugins-bad0.10/</link>
      <pubDate>Mon, 27 Sep 2021 06:01:13 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-486-1-gst-plugins-bad0.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-486-1-gst-plugins-bad0.10/">
      
&lt;p&gt;Package : gst-plugins-bad0.10&lt;/p&gt;


&lt;p&gt;Version : 0.10.23-7.4&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3185&#34;&gt;CVE-2021-3185&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Andrew Wesie discovered a buffer overflow in
the H264 support of the GStreamer multimedia
framework, which could potentially result in
the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-485-1 nettle security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-485-1-nettle/</link>
      <pubDate>Sun, 19 Sep 2021 00:53:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-485-1-nettle/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-485-1-nettle/">
      
&lt;p&gt;Package : nettle&lt;/p&gt;


&lt;p&gt;Version : 2.7.1-5&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3580&#34;&gt;CVE-2021-3580&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20305&#34;&gt;CVE-2021-20305&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in nettle, a low level cryptographic
library, which could result in denial of service (remote crash in RSA
decryption via specially crafted ciphertext, crash on ECDSA signature
verification) or incorrect verification of ECDSA signatures.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-484-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-484-1-openssl/</link>
      <pubDate>Sat, 18 Sep 2021 22:19:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-484-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-484-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u15&lt;/p&gt;


      &lt;p&gt;OpenSSL, a cryptography library for secure communication, fails to
validate alternate trust chains in some conditions.  In particular
this breaks connecting to servers that use Let&amp;rsquo;s Encrypt certificates,
starting 2021-10-01.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-483-1 gnutls28 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-483-1-gnutls28/</link>
      <pubDate>Fri, 17 Sep 2021 22:00:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-483-1-gnutls28/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-483-1-gnutls28/">
      
&lt;p&gt;Package : gnutls28&lt;/p&gt;


&lt;p&gt;Version : 3.3.30-0&amp;#43;deb8u2&lt;/p&gt;


      &lt;p&gt;GnuTLS, a portable cryptography library, fails to validate alternate
trust chains in some conditions.  In particular this breaks connecting
to servers that use Let&amp;rsquo;s Encrypt certificates, starting 2021-10-01.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-481-2 qemu regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-481-2-qemu/</link>
      <pubDate>Sun, 12 Sep 2021 01:19:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-481-2-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-481-2-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u22&lt;/p&gt;


      &lt;p&gt;It was found that the patch for CVE-2021-3592 introduced a regression which
prevented ssh connections to the host system. Since there is no imminent
solution for the problem, the patch for CVE-2021-3592 has been reverted.
Updated qemu packages are now available to correct this issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-482-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-482-1-postgresql-9.4/</link>
      <pubDate>Fri, 10 Sep 2021 13:36:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-482-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-482-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25694&#34;&gt;CVE-2020-25694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25695&#34;&gt;CVE-2020-25695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25696&#34;&gt;CVE-2020-25696&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32027&#34;&gt;CVE-2021-32027&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in PostgreSQL, an
object-relational SQL database.  An attacker could have an opportunity
to complete a MITM attack, execute arbitrary SQL functions under the
identity of a superuser, execute arbitrary code as the operating
system account running psql when connecting to a rogue server, and
corrupt server memory, in some conditions.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25694&lt;/p&gt;
&lt;p&gt;If a client application that creates additional database
connections only reuses the basic connection parameters while
dropping security-relevant parameters, an opportunity for a
man-in-the-middle attack, or the ability to observe clear-text
transmissions, could exist.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25695&lt;/p&gt;
&lt;p&gt;An attacker having permission to create non-temporary objects in
at least one schema can execute arbitrary SQL functions under the
identity of a superuser.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25696&lt;/p&gt;
&lt;p&gt;If an interactive psql session uses \gset when querying a
compromised server, the attacker can execute arbitrary code as the
operating system account running psql.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-32027&lt;/p&gt;
&lt;p&gt;While modifying certain SQL array values, missing bounds checks
let authenticated database users write arbitrary bytes to a wide
area of server memory.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-481-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-481-1-qemu/</link>
      <pubDate>Tue, 31 Aug 2021 23:48:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-481-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-481-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3527&#34;&gt;CVE-2021-3527&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3592&#34;&gt;CVE-2021-3592&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3594&#34;&gt;CVE-2021-3594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3682&#34;&gt;CVE-2021-3682&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3713&#34;&gt;CVE-2021-3713&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been found in Qemu, a fast processor
emulator.&lt;/p&gt;
&lt;p&gt;CVE-2021-3713&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device
emulation of QEMU. The device uses the guest supplied stream number
unchecked, which can lead to out-of-bounds access to the UASDevice-&amp;gt;data3
and UASDevice-&amp;gt;status3 fields. A malicious guest user could use this flaw
to crash QEMU or potentially achieve code execution with the privileges of
the QEMU process on the host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3682&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the USB redirector device emulation of QEMU. It occurs
when dropping packets during a bulk transfer from a SPICE client due to the
packet queue being full. A malicious SPICE client could use this flaw to
make QEMU call free() with faked heap chunk metadata, resulting in a crash
of QEMU or potential code execution with the privileges of the QEMU process
on the host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3527&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the USB redirector device (usb-redir) of QEMU. Small
USB packets are combined into a single, large transfer request, to reduce
the overhead and improve performance. The combined size of the bulk
transfer is used to dynamically allocate a variable length array (VLA) on
the stack without proper validation. Since the total size is not bounded, a
malicious guest could use this flaw to influence the array length and cause
the QEMU process to perform an excessive allocation on the stack, resulting
in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An invalid pointer initialization issue was found in the SLiRP networking
implementation of QEMU. The flaw exists in the udp_input() function and
could occur while processing a udp packet that is smaller than the size of
the &#39;udphdr&#39; structure. This issue may lead to out-of-bounds read access or
indirect host memory disclosure to the guest. The highest threat from this
vulnerability is to data confidentiality.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3592&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An invalid pointer initialization issue was found in the SLiRP networking
implementation of QEMU. The flaw exists in the bootp_input() function and
could occur while processing a udp packet that is smaller than the size of
the &#39;bootp_t&#39; structure. A malicious guest could use this flaw to leak 10
bytes of uninitialized heap memory from the host. The highest threat from
this vulnerability is to data confidentiality.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-480-1 squashfs-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-480-1-squashfs-tools/</link>
      <pubDate>Tue, 31 Aug 2021 15:57:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-480-1-squashfs-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-480-1-squashfs-tools/">
      
&lt;p&gt;Package : squashfs-tools&lt;/p&gt;


&lt;p&gt;Version : 1:4.2&amp;#43;20130409-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-40153&#34;&gt;CVE-2021-40153&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in squashfs-tools, a tool to create and append to squashfs filesystems.
As unsquashfs did not validate all filepaths, it would allow writing outside of the original destination.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-479-1 exiv2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-479-1-exiv2/</link>
      <pubDate>Mon, 30 Aug 2021 08:39:49 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-479-1-exiv2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-479-1-exiv2/">
      
&lt;p&gt;Package : exiv2&lt;/p&gt;


&lt;p&gt;Version : 0.24-4.1&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20421&#34;&gt;CVE-2019-20421&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3482&#34;&gt;CVE-2021-3482&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29457&#34;&gt;CVE-2021-29457&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29473&#34;&gt;CVE-2021-29473&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31291&#34;&gt;CVE-2021-31291&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31292&#34;&gt;CVE-2021-31292&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in Exiv2, a C++ library
and a command line utility to manage image metadata which could result
in denial of service or the execution of arbitrary code if a malformed
file is parsed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-292-2 libonig regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-292-2-libonig/</link>
      <pubDate>Sat, 28 Aug 2021 09:58:48 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-292-2-libonig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-292-2-libonig/">
      
&lt;p&gt;Package : libonig&lt;/p&gt;


&lt;p&gt;Version : 5.9.5-3.2&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26159&#34;&gt;CVE-2020-26159&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2020-26159 was determined to not be a vulnerability and was
rejected.  As a result, the previously applied patch to address
CVE-2020-26159 has been reverted.  The additional fixes which were
included in ELA-292-1 remain in place.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-473-2 openjdk-7 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-473-2-openjdk-7/</link>
      <pubDate>Wed, 18 Aug 2021 11:46:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-473-2-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-473-2-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u311-2.6.27-0&amp;#43;deb8u2&lt;/p&gt;


      &lt;p&gt;A recent update for OpenJDK 7 introduced a regression that made applications
crash if they opened the java.security configuration file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-470-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-470-1-curl/</link>
      <pubDate>Sat, 14 Aug 2021 01:09:12 +0300</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-470-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-470-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22898&#34;&gt;CVE-2021-22898&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Information disclosure in connection to telnet servers was fixed in curl,
a client-side URL transfer library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-478-1 commons-io security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-478-1-commons-io/</link>
      <pubDate>Fri, 13 Aug 2021 00:21:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-478-1-commons-io/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-478-1-commons-io/">
      
&lt;p&gt;Package : commons-io&lt;/p&gt;


&lt;p&gt;Version : 2.4-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29425&#34;&gt;CVE-2021-29425&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Lukas Euler discovered a path traversal vulnerability in commons-io, a Java
library for common useful IO related classes. When invoking the method
FileNameUtils.normalize with an improper input string, like &amp;ldquo;//../foo&amp;rdquo;, or
&amp;ldquo;\..\foo&amp;rdquo;, the result would be the same value, thus possibly providing access
to files in the parent directory, but not further above (thus &amp;ldquo;limited&amp;rdquo; path
traversal), if the calling code would use the result to construct a path value.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-477-1 libspf2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-477-1-libspf2/</link>
      <pubDate>Wed, 11 Aug 2021 17:30:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-477-1-libspf2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-477-1-libspf2/">
      
&lt;p&gt;Package : libspf2&lt;/p&gt;


&lt;p&gt;Version : 1.2.10-5&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20314&#34;&gt;CVE-2021-20314&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Philipp Jeitner and Haya Shulman discovered a stack-based buffer
overflow in libspf2, a library for validating mail senders with SPF,
which could result in denial of service, or potentially execution of
arbitrary code when processing a specially crafted SPF record.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-475-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-475-1-tomcat8/</link>
      <pubDate>Wed, 11 Aug 2021 15:58:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-475-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-475-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30640&#34;&gt;CVE-2021-30640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33037&#34;&gt;CVE-2021-33037&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2021-30640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to
authenticate using variations of a valid user name and/or to bypass some of
the protection provided by the LockOut Realm.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33037&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Apache Tomcat did not correctly parse the HTTP transfer-encoding request
header in some circumstances leading to the possibility to request
smuggling when used with a reverse proxy. Specifically: - Tomcat
incorrectly ignored the transfer encoding header if the client declared it
would only accept an HTTP/1.0 response; - Tomcat honoured the identify
encoding; and - Tomcat did not ensure that, if present, the chunked
encoding was the final encoding.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-474-1 c-ares security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-474-1-c-ares/</link>
      <pubDate>Tue, 10 Aug 2021 08:41:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-474-1-c-ares/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-474-1-c-ares/">
      
&lt;p&gt;Package : c-ares&lt;/p&gt;


&lt;p&gt;Version : 1.10.0-2&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3672&#34;&gt;CVE-2021-3672&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in c-ares, an asynchronous name resolver.
Missing input validation of host names returned by Domain Name Servers can lead to output of wrong hostnames.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-476-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-476-1-openjdk-8/</link>
      <pubDate>Mon, 09 Aug 2021 15:32:10 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-476-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-476-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u302-b08-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2341&#34;&gt;CVE-2021-2341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2369&#34;&gt;CVE-2021-2369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2388&#34;&gt;CVE-2021-2388&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in bypass of sandbox restrictions, incorrect validation of
signed Jars or information disclosure.&lt;/p&gt;
&lt;p&gt;Thanks to Thorsten Glaser and ⮡ tarent for contributing the updated
packages to address these vulnerabilities.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-471-1 ceph security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-471-1-ceph/</link>
      <pubDate>Mon, 09 Aug 2021 18:44:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-471-1-ceph/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-471-1-ceph/">
      
&lt;p&gt;Package : ceph&lt;/p&gt;


&lt;p&gt;Version : 0.80.7-2&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10753&#34;&gt;CVE-2020-10753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3524&#34;&gt;CVE-2021-3524&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway).
The vulnerability is related to the injection of HTTP headers via a CORS
ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS
configuration file generates a header injection in the response when the CORS
request is made.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-473-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-473-1-openjdk-7/</link>
      <pubDate>Mon, 09 Aug 2021 18:39:34 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-473-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-473-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u311-2.6.27-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2341&#34;&gt;CVE-2021-2341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2369&#34;&gt;CVE-2021-2369&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2432&#34;&gt;CVE-2021-2432&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-472-1 lynx-cur security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-472-1-lynx-cur/</link>
      <pubDate>Mon, 09 Aug 2021 16:47:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-472-1-lynx-cur/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-472-1-lynx-cur/">
      
&lt;p&gt;Package : lynx-cur&lt;/p&gt;


&lt;p&gt;Version : 2.8.9dev1-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-38165&#34;&gt;CVE-2021-38165&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a remote authentication credential leak in the
&lt;code&gt;lynx&lt;/code&gt; text-based web browser.&lt;/p&gt;
&lt;p&gt;The package now correctly handles authentication subcomponents in URIs (eg.
&lt;code&gt;https://user:pass@example.com&lt;/code&gt;) to avoid remote attackers discovering
cleartext credentials in SSL connection data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-469-1 openexr security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-469-1-openexr/</link>
      <pubDate>Wed, 04 Aug 2021 21:41:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-469-1-openexr/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-469-1-openexr/">
      
&lt;p&gt;Package : openexr&lt;/p&gt;


&lt;p&gt;Version : 1.6.1-8&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3605&#34;&gt;CVE-2021-3605&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20300&#34;&gt;CVE-2021-20300&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20303&#34;&gt;CVE-2021-20303&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in OpenEXR, a library and
tools for the OpenEXR high dynamic-range (HDR) image format. An
attacker could cause a denial of service (DoS) through application
crash, and possibly execute code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-468-1 libkohana2-php security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-468-1-libkohana2-php/</link>
      <pubDate>Wed, 04 Aug 2021 21:10:56 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-468-1-libkohana2-php/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-468-1-libkohana2-php/">
      
&lt;p&gt;Package : libkohana2-php&lt;/p&gt;


&lt;p&gt;Version : 2.3.4-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10510&#34;&gt;CVE-2016-10510&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;David Sopas discovered that Kohana, a PHP framework, was vulnerable to
a Cross-site scripting (XSS) attack that allowed remote attackers to
inject arbitrary web script or HTML by bypassing the strip_image_tags
protection mechanism in system/classes/Kohana/Security.php. This issue
was resolved by permanently removing the strip_image_tags function.
Users are advised to sanitize user input by using external libraries
instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-467-1 wordpress security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-467-1-wordpress/</link>
      <pubDate>Wed, 04 Aug 2021 19:25:29 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-467-1-wordpress/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-467-1-wordpress/">
      
&lt;p&gt;Package : wordpress&lt;/p&gt;


&lt;p&gt;Version : 4.1.33&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;One security issue affects WordPress, a weblog manager, versions
between 3.7 and 5.7. This update fixes the following security issues:
Object injection in PHPMailer (CVE-2020-36326 and CVE-2018-19296).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-466-1 libjdom1-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-466-1-libjdom1-java/</link>
      <pubDate>Wed, 04 Aug 2021 19:22:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-466-1-libjdom1-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-466-1-libjdom1-java/">
      
&lt;p&gt;Package : libjdom1-java&lt;/p&gt;


&lt;p&gt;Version : 1.1.3-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33813&#34;&gt;CVE-2021-33813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an XML External Entity (XXE) issue in
&lt;code&gt;libjdom1-java&lt;/code&gt;, a library for reading and manipulating XML documents.
Attackers could have caused a denial of service attack via a specially-crafted
HTTP request.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-465-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-465-1-intel-microcode/</link>
      <pubDate>Mon, 02 Aug 2021 04:45:38 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-465-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-465-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20210608.2~deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24489&#34;&gt;CVE-2020-24489&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24511&#34;&gt;CVE-2020-24511&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24512&#34;&gt;CVE-2020-24512&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24513&#34;&gt;CVE-2020-24513&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for some types of Intel CPUs
and provides mitigations for security vulnerabilities which could
result in privilege escalation in combination with VT-d and various
side channel attacks.&lt;/p&gt;
&lt;p&gt;Please note that one of the processors is not receiving this update
and so the users of 0x906ea processors that don&amp;rsquo;t have Intel Wireless
on-board can use the package from the buster-security, instead.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-464-1 libsndfile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-464-1-libsndfile/</link>
      <pubDate>Fri, 30 Jul 2021 00:28:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-464-1-libsndfile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-464-1-libsndfile/">
      
&lt;p&gt;Package : libsndfile&lt;/p&gt;


&lt;p&gt;Version : 1.0.25-9.1&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3246&#34;&gt;CVE-2021-3246&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libsndfile, a library for reading/writing audio files.
A crafted WAV file can trigger a heap buffer overflow and might allow exectution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-463-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-463-1-linux-4.9/</link>
      <pubDate>Tue, 27 Jul 2021 11:02:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-463-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-463-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.272-2~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3609&#34;&gt;CVE-2021-3609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21781&#34;&gt;CVE-2021-21781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33909&#34;&gt;CVE-2021-33909&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-34693&#34;&gt;CVE-2021-34693&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2021-3609&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Norbert Slusarek reported a race condition vulnerability in the CAN
BCM networking protocol, allowing a local attacker to escalate
privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-21781&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;Lilith &amp;gt;_&amp;gt;&amp;quot; of Cisco Talos discovered that the Arm initialisation
code does not fully initialise the &amp;quot;sigpage&amp;quot; that is mapped into
user-space processes to support signal handling.  This could
result in leaking sensitive information, particularly when the
system is rebooted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33909&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Qualys Research Labs discovered a size_t-to-int conversion
vulnerability in the Linux kernel&#39;s filesystem layer. An
unprivileged local attacker able to create, mount, and then delete a
deep directory structure whose total path length exceeds 1GB, can
take advantage of this flaw for privilege escalation.

Details can be found in the Qualys advisory at
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-34693&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Norbert Slusarek discovered an information leak in the CAN BCM
networking protocol. A local attacker can take advantage of this
flaw to obtain sensitive information from kernel stack memory.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-462-1 aspell security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-462-1-aspell/</link>
      <pubDate>Mon, 26 Jul 2021 00:06:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-462-1-aspell/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-462-1-aspell/">
      
&lt;p&gt;Package : aspell&lt;/p&gt;


&lt;p&gt;Version : 0.60.7~20110707-1.3&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-25051&#34;&gt;CVE-2019-25051&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;One issue has been found in aspell, the GNU Aspell spell-checker.
It is related to a heap-based buffer overflow.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-461-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-461-1-jasper/</link>
      <pubDate>Thu, 22 Jul 2021 23:52:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-461-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-461-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-debian1-2.4&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27845&#34;&gt;CVE-2021-27845&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in jasper, a JPEG-2000 runtime library.
A Divide-by-zero vulnerability exists in JasPer Image Coding Toolkit 2.0 in jasper/src/libjasper/jpc/jpc_enc.c&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-460-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-460-1-redis/</link>
      <pubDate>Thu, 22 Jul 2021 11:31:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-460-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-460-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.8.17-1&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32761&#34;&gt;CVE-2021-32761&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were several integer overflow issues in Redis, a
popular key-value database system. Some BITFIELD-related commands were affected
on 32-bit systems.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-459-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-459-1-openjdk-7/</link>
      <pubDate>Wed, 21 Jul 2021 12:47:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-459-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-459-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u301-2.6.26-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2161&#34;&gt;CVE-2021-2161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2163&#34;&gt;CVE-2021-2163&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-458-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-458-1-linux-4.9/</link>
      <pubDate>Thu, 15 Jul 2021 16:44:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-458-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-458-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.272-1~deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24586&#34;&gt;CVE-2020-24586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24587&#34;&gt;CVE-2020-24587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24588&#34;&gt;CVE-2020-24588&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25670&#34;&gt;CVE-2020-25670&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25671&#34;&gt;CVE-2020-25671&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25672&#34;&gt;CVE-2020-25672&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26139&#34;&gt;CVE-2020-26139&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26147&#34;&gt;CVE-2020-26147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26558&#34;&gt;CVE-2020-26558&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29374&#34;&gt;CVE-2020-29374&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36322&#34;&gt;CVE-2020-36322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0129&#34;&gt;CVE-2021-0129&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0512&#34;&gt;CVE-2021-0512&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3428&#34;&gt;CVE-2021-3428&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3483&#34;&gt;CVE-2021-3483&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3564&#34;&gt;CVE-2021-3564&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3573&#34;&gt;CVE-2021-3573&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3587&#34;&gt;CVE-2021-3587&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20292&#34;&gt;CVE-2021-20292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23133&#34;&gt;CVE-2021-23133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23134&#34;&gt;CVE-2021-23134&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28660&#34;&gt;CVE-2021-28660&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28688&#34;&gt;CVE-2021-28688&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28950&#34;&gt;CVE-2021-28950&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28964&#34;&gt;CVE-2021-28964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28971&#34;&gt;CVE-2021-28971&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29154&#34;&gt;CVE-2021-29154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29265&#34;&gt;CVE-2021-29265&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29647&#34;&gt;CVE-2021-29647&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29650&#34;&gt;CVE-2021-29650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30002&#34;&gt;CVE-2021-30002&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31916&#34;&gt;CVE-2021-31916&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32399&#34;&gt;CVE-2021-32399&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33034&#34;&gt;CVE-2021-33034&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to the execution of arbitrary code, privilege escalation,
denial of service, or information leaks.&lt;/p&gt;
&lt;p&gt;This update is not yet available for the armel (ARM EABI soft-float)
architecture.&lt;/p&gt;
&lt;p&gt;CVE-2020-24586, CVE-2020-24587, CVE-2020-26147&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mathy Vanhoef discovered that many Wi-Fi implementations,
including Linux&#39;s mac80211, did not correctly implement reassembly
of fragmented packets.  In some circumstances, an attacker within
range of a network could exploit these flaws to forge arbitrary
packets and/or to access sensitive data on that network.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24588&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mathy Vanhoef discovered that most Wi-Fi implementations,
including Linux&#39;s mac80211, did not authenticate the &amp;quot;is
aggregated&amp;quot; packet header flag.  An attacker within range of a
network could exploit this to forge arbitrary packets on that
network.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25670, CVE-2020-25671, CVE-2021-23134&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;kiyin (尹亮) of TenCent discovered several reference counting bugs
in the NFC LLCP implementation which could lead to use-after-free.
A local user could exploit these for denial of service (crash or
memory corruption) or possibly for privilege escalation.

Nadav Markus and Or Cohen of Palo Alto Networks discovered that
the original fixes for these introduced a new bug that could
result in use-after-free and double-free.  This has also been
fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25672&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;kiyin (尹亮) of TenCent discovered a memory leak in the NFC LLCP
implementation.  A local user could exploit this for denial of
service (memory exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-26139&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mathy Vanhoef discovered that a bug in some Wi-Fi implementations,
including Linux&#39;s mac80211.  When operating in AP mode, they would
forward EAPOL frames from one client to another while the sender
was not yet authenticated.  An attacker within range of a network
could use this for denial of service or as an aid to exploiting
other vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-26558, CVE-2021-0129&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Researchers at ANSSI discovered vulnerabilities in the Bluetooth
Passkey authentication method, and in Linux&#39;s implementation of
it.  An attacker within range of two Bluetooth devices while they
pair using Passkey authentication could exploit this to obtain the
shared secret (Passkey) and then impersonate either of the devices
to each other.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-29374&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn of Google reported a flaw in Linux&#39;s virtual memory
management.  A parent and child process initially share all their
memory, but when either writes to a shared page, the page is
duplicated and unshared (copy-on-write).  However, in case an
operation such as vmsplice() required the kernel to take an
additional reference to a shared page, and a copy-on-write occurs
during this operation, the kernel might have accessed the wrong
process&#39;s memory.  For some programs, this could lead to an
information leak or data corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36322, CVE-2021-28950&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found that the FUSE (filesystem-in-user-space)
implementation did not correctly handle a FUSE server returning
invalid attributes for a file.  A local user permitted to run a
FUSE server could use this to cause a denial of service (crash).

The original fix for this introduced a different potential denial
of service (infinite loop in kernel space), which has also been
fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3428&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wolfgang Frisch reported a potential integer overflow in the ext4
filesystem driver. A user permitted to mount arbitrary filesystem
images could use this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3483&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;马哲宇 (Zheyu Ma) reported a bug in the &amp;quot;nosy&amp;quot; driver for TI
PCILynx FireWire controllers, which could lead to list corruption
and a use-after-free.  On a system that uses this driver, local
users granted access to /dev/nosy could exploit this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3564, CVE-2021-3573, CVE-2021-32399&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The BlockSec team discovered several race conditions in the
Bluetooth subsystem that could lead to a use-after-free or
double-free.  A local user could exploit these to caue a denial of
service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3587&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Active Defense Lab of Venustech discovered a potential null
pointer dereference in the NFC LLCP implementation.  A local user
could use this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20292&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the TTM buffer allocation API used by GPU
drivers did not handle allocation failures in the way that most
drivers expected, resulting in a double-free on failure.  A local
user on a system using one of these drivers could possibly exploit
this to cause a denial of service (crash or memory corruption) or
for privilege escalation.  The API has been changed to match
driver expectations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-23133&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Or Cohen of Palo Alto Networks discovered a race condition in the
SCTP implementation, which can lead to list corruption.  A local
user could exploit this to cause a denial of service (crash or
memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28660&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the rtl8188eu WiFi driver did not correctly
limit the length of SSIDs copied into scan results. An attacker
within WiFi range could use this to cause a denial of service
(crash or memory corruption) or possibly to execute code on a
vulnerable system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28688 (XSA-371)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the original fix for CVE-2021-26930
(XSA-365) introduced a potential resource leak.  A malicious guest
could presumably exploit this to cause a denial of service
(resource exhaustion) within the host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28964&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zygo Blaxell reported a race condition in the Btrfs driver which
can lead to an assertion failure.  On systems using Btrfs, a local
user could exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-28971&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vince Weaver reported a bug in the performance event handler for
Intel PEBS.  A workaround for a hardware bug on Intel CPUs
codenamed &amp;quot;Haswell&amp;quot; and earlier could lead to a null pointer
dereference.  On systems with the affected CPUs, if users are
permitted to access performance events, a local user may exploit
this to cause a denial of service (crash).

By default, unprivileged users do not have access to performance
events, which mitigates this issue.  This is controlled by the
kernel.perf_event_paranoid sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29154&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Extended BPF (eBPF) JIT compiler
for x86_64 generated incorrect branch instructions in some
cases.  On systems where eBPF JIT is enabled, users could
exploit this to execute arbitrary code in the kernel.

By default, eBPF JIT is disabled, mitigating this issue.  This is
controlled by the net.core.bpf_jit_enable sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29265&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the USB/IP host
(server) implementation which can lead to a null pointer
dereference.  On a system acting as a USB/IP host, a client
can exploit this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29647&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found an information leak in the Qualcomm IPC
Router (qrtr) implementation.

This protocol is not enabled in Debian&#39;s official kernel
configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-29650&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a data race in the netfilter subsystem
could lead to a null pointer dereference during replacement of a
table.  A local user with CAP_NET_ADMIN capability in any user
namespace could use this to cause a denial of service (crash).

By default, unprivileged users cannot create user namespaces,
which mitigates this issue.  This is controlled by the
kernel.unprivileged_userns_clone sysctl.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-30002&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Arnd Bergmann and the syzbot tool found a memory leak in the
Video4Linux (v4l) subsystem.  A local user permitted to access
video devices (by default, any member of the &amp;quot;video&amp;quot; group) could
exploit this to cause a denial of service (memory exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-31916&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dan Carpenter reported incorrect parameter validation in the
device-mapper (dm) subsystem, which could lead to a heap buffer
overrun.  However, only users with CAP_SYS_ADMIN capability
(i.e. root-equivalent) could trigger this bug, so it did not
have any security impact in this kernel version.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-33034&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a bug in the Bluetooth subsystem that could
lead to a use-after-free.  A local user could use this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-457-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-457-1-php5/</link>
      <pubDate>Thu, 15 Jul 2021 10:40:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-457-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-457-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9675&#34;&gt;CVE-2019-9675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7068&#34;&gt;CVE-2020-7068&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7071&#34;&gt;CVE-2020-7071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21702&#34;&gt;CVE-2021-21702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21704&#34;&gt;CVE-2021-21704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21705&#34;&gt;CVE-2021-21705&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in php5, a server-side,
HTML-embedded scripting language. An attacker could cause denial of
service (DoS), memory corruption and potentially execution of
arbitrary code, and server-side request forgery (SSRF) bypass.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-9675&lt;/p&gt;
&lt;p&gt;phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow
via a long link value.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-7068&lt;/p&gt;
&lt;p&gt;While processing PHAR files using phar extension,
phar_parse_zipfile could be tricked into accessing freed memory,
which could lead to a crash or information disclosure.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-7071&lt;/p&gt;
&lt;p&gt;When validating URL with functions like filter_var($url,
FILTER_VALIDATE_URL), PHP will accept an URL with invalid password
as valid URL. This may lead to functions that rely on URL being
valid to mis-parse the URL and produce wrong data as components of
the URL.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-21702&lt;/p&gt;
&lt;p&gt;When using SOAP extension to connect to a SOAP server, a malicious
SOAP server could return malformed XML data as a response that
would cause PHP to access a null pointer and thus cause a crash.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-21704&lt;/p&gt;
&lt;p&gt;Multiple firebird issues.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-21705&lt;/p&gt;
&lt;p&gt;SSRF bypass in FILTER_VALIDATE_URL.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-456-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-456-1-apache2/</link>
      <pubDate>Fri, 09 Jul 2021 10:50:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-456-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-456-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1927&#34;&gt;CVE-2020-1927&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1934&#34;&gt;CVE-2020-1934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35452&#34;&gt;CVE-2020-35452&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26690&#34;&gt;CVE-2021-26690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26691&#34;&gt;CVE-2021-26691&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-30641&#34;&gt;CVE-2021-30641&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in the Apache HTTP server, which
could result in denial of service. In addition the implementation of
the MergeSlashes option could result in unexpected behaviour.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-455-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-455-1-libxstream-java/</link>
      <pubDate>Mon, 05 Jul 2021 18:28:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-455-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-455-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-29505&#34;&gt;CVE-2021-29505&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability in XStream, a Java library to serialize objects to and
from XML, may allow a remote attacker to execute commands of the host
only by manipulating the processed input stream.&lt;/p&gt;
&lt;p&gt;Note: the XStream project recommends to setup its security framework
with a whitelist limited to the minimal required types, rather than
relying on the black list (which got updated to address this
vulnerability). The project is also phasing out maintainance of the
black list, see &lt;a href=&#34;https://x-stream.github.io/security.html&#34;&gt;https://x-stream.github.io/security.html&lt;/a&gt; .&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-454-1 djvulibre security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-454-1-djvulibre/</link>
      <pubDate>Sun, 04 Jul 2021 02:12:40 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-454-1-djvulibre/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-454-1-djvulibre/">
      
&lt;p&gt;Package : djvulibre&lt;/p&gt;


&lt;p&gt;Version : 3.5.25.4-4&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3630&#34;&gt;CVE-2021-3630&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out-of-bounds write vulnerability was found in DjVuLibre in
DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file
which may lead to crash and segmentation fault.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-453-1 openexr security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-453-1-openexr/</link>
      <pubDate>Sat, 03 Jul 2021 18:57:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-453-1-openexr/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-453-1-openexr/">
      
&lt;p&gt;Package : openexr&lt;/p&gt;


&lt;p&gt;Version : 1.6.1-8&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9110&#34;&gt;CVE-2017-9110&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9111&#34;&gt;CVE-2017-9111&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9112&#34;&gt;CVE-2017-9112&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9113&#34;&gt;CVE-2017-9113&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9115&#34;&gt;CVE-2017-9115&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9116&#34;&gt;CVE-2017-9116&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12596&#34;&gt;CVE-2017-12596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11760&#34;&gt;CVE-2020-11760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11761&#34;&gt;CVE-2020-11761&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11763&#34;&gt;CVE-2020-11763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11764&#34;&gt;CVE-2020-11764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3475&#34;&gt;CVE-2021-3475&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3476&#34;&gt;CVE-2021-3476&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3479&#34;&gt;CVE-2021-3479&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in OpenEXR, a library and
tools for the OpenEXR high dynamic-range (HDR) image format. An
attacker could cause a denial of service (DoS) through application
crash and excessive memory consumption, and possibly execute code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-452-1 python-pip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-452-1-python-pip/</link>
      <pubDate>Sat, 03 Jul 2021 17:09:54 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-452-1-python-pip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-452-1-python-pip/">
      
&lt;p&gt;Package : python-pip&lt;/p&gt;


&lt;p&gt;Version : 1.5.6-5&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3572&#34;&gt;CVE-2021-3572&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that pip incorrectly handled unicode separators in git
references. A remote attacker could possibly use this issue to install a
different revision on a repository.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-451-1 htmldoc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-451-1-htmldoc/</link>
      <pubDate>Thu, 01 Jul 2021 06:03:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-451-1-htmldoc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-451-1-htmldoc/">
      
&lt;p&gt;Package : htmldoc&lt;/p&gt;


&lt;p&gt;Version : 1.8.27-8&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20308&#34;&gt;CVE-2021-20308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23158&#34;&gt;CVE-2021-23158&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23165&#34;&gt;CVE-2021-23165&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23180&#34;&gt;CVE-2021-23180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23191&#34;&gt;CVE-2021-23191&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23206&#34;&gt;CVE-2021-23206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26252&#34;&gt;CVE-2021-26252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26259&#34;&gt;CVE-2021-26259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26948&#34;&gt;CVE-2021-26948&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow was discovered in HTMLDOC, a HTML processor that
generates indexed HTML, PS, and PDF, which could potentially result in
the execution of arbitrary code. In addition a number of crashes
were addressed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-450-1 fluidsynth security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-450-1-fluidsynth/</link>
      <pubDate>Tue, 29 Jun 2021 23:40:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-450-1-fluidsynth/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-450-1-fluidsynth/">
      
&lt;p&gt;Package : fluidsynth&lt;/p&gt;


&lt;p&gt;Version : 1.1.6-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28421&#34;&gt;CVE-2021-28421&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerbility has been found in fluidsynth, a real-time MIDI software synthesizer.
Using a special crafted soundfont2 file, a use after free vulnerability might result in arbitrary code execution or a denial of service (DoS).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-449-1 libjdom2-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-449-1-libjdom2-java/</link>
      <pubDate>Tue, 29 Jun 2021 12:49:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-449-1-libjdom2-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-449-1-libjdom2-java/">
      
&lt;p&gt;Package : libjdom2-java&lt;/p&gt;


&lt;p&gt;Version : 2.0.6-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33813&#34;&gt;CVE-2021-33813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an XML External Entity (XXE) issue in
&lt;code&gt;libjdom2-java&lt;/code&gt;, a library for reading and manipulating XML documents.
Attackers could have caused a denial of service attack via a specially-crafted
HTTP request.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-448-1 cloud-int security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-448-1-cloud-int/</link>
      <pubDate>Mon, 28 Jun 2021 04:34:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-448-1-cloud-int/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-448-1-cloud-int/">
      
&lt;p&gt;Package : cloud-int&lt;/p&gt;


&lt;p&gt;Version : 0.7.6~bzr976-2&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3429&#34;&gt;CVE-2021-3429&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;cloud-init has the ability to generate and set a randomized password
for system users. This functionality is enabled at runtime by
passing cloud-config data such as:&lt;/p&gt;
&lt;p&gt;chpasswd:
list: |
user1:RANDOM&lt;/p&gt;
&lt;p&gt;When used this way, cloud-init logs the raw, unhashed password to a
world-readable local file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-447-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-447-1-tiff/</link>
      <pubDate>Mon, 28 Jun 2021 00:44:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-447-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-447-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.3-12.3&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35523&#34;&gt;CVE-2020-35523&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35524&#34;&gt;CVE-2020-35524&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been discovered in the libtiff library and the
included tools, which may result in denial of service or the execution
of arbitrary code if malformed image files are processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-446-1 xmlbeans security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-446-1-xmlbeans/</link>
      <pubDate>Mon, 28 Jun 2021 00:07:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-446-1-xmlbeans/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-446-1-xmlbeans/">
      
&lt;p&gt;Package : xmlbeans&lt;/p&gt;


&lt;p&gt;Version : 2.6.0-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23926&#34;&gt;CVE-2021-23926&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The XML parsers used by XMLBeans did not set the properties needed to protect
the user from malicious XML input. Vulnerabilities include the possibility for
XML Entity Expansion attacks which could lead to a denial-of-service. This
update implements sensible defaults for the XML parsers to prevent these
kind of attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-445-1 bluez security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-445-1-bluez/</link>
      <pubDate>Sun, 27 Jun 2021 01:19:21 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-445-1-bluez/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-445-1-bluez/">
      
&lt;p&gt;Package : bluez&lt;/p&gt;


&lt;p&gt;Version : 5.43-2&amp;#43;deb9u2~deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26558&#34;&gt;CVE-2020-26558&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0129&#34;&gt;CVE-2021-0129&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in bluez, a package with Bluetooth tools and daemons.
One issue is about a man-in-the-middle attack during secure pairing, the other is about information disclosure due to improper access control.&lt;/p&gt;
&lt;p&gt;In order to completely fix both issues, you need an updated kernel as well!&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-444-1 libgcrypt20 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-444-1-libgcrypt20/</link>
      <pubDate>Fri, 25 Jun 2021 00:18:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-444-1-libgcrypt20/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-444-1-libgcrypt20/">
      
&lt;p&gt;Package : libgcrypt20&lt;/p&gt;


&lt;p&gt;Version : 1.6.3-2&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33560&#34;&gt;CVE-2021-33560&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libgcrypt20, a crypto library.
Mishandling of ElGamal encryption results in a possible side-channel attack
and an interoperability problem with keys not generated by GnuPG/libgcrypt.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-443-1 jetty security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-443-1-jetty/</link>
      <pubDate>Thu, 17 Jun 2021 20:06:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-443-1-jetty/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-443-1-jetty/">
      
&lt;p&gt;Package : jetty&lt;/p&gt;


&lt;p&gt;Version : 6.1.26-4&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28169&#34;&gt;CVE-2021-28169&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Steven Seeley discovered that in jetty, a Java servlet engine and
webserver, requests to the ConcatServlet and WelcomeFilter are able to
access protected resources within the WEB-INF directory. An attacker
may access sensitive information regarding the implementation of a web
application.&lt;/p&gt;
&lt;p&gt;This update also improves the fix to CVE-2017-9735 to cover more
timing attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-442-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-442-1-squid3/</link>
      <pubDate>Wed, 09 Jun 2021 18:18:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-442-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-442-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28651&#34;&gt;CVE-2021-28651&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28652&#34;&gt;CVE-2021-28652&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31806&#34;&gt;CVE-2021-31806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31807&#34;&gt;CVE-2021-31807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31808&#34;&gt;CVE-2021-31808&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33620&#34;&gt;CVE-2021-33620&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Joshua Rogers discovered several vulnerabilities in Squid, a proxy
caching server. An attacker could cause Denial of Service (DoS).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-28651&lt;/p&gt;
&lt;p&gt;Denial of Service in URN processing.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-28652&lt;/p&gt;
&lt;p&gt;Denial of Service issue in Cache Manager.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-31806, CVE-2021-31807, CVE-2021-31808&lt;/p&gt;
&lt;p&gt;Multiple Issues in HTTP Range header.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-33620&lt;/p&gt;
&lt;p&gt;Denial of Service in HTTP Response processing.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-441-1 nginx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-441-1-nginx/</link>
      <pubDate>Mon, 07 Jun 2021 23:05:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-441-1-nginx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-441-1-nginx/">
      
&lt;p&gt;Package : nginx&lt;/p&gt;


&lt;p&gt;Version : 1.6.2-5&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-20005&#34;&gt;CVE-2017-20005&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jamie Landeg-Jones and Manfred Paul discovered a buffer overflow vulnerability
in NGINX, a small, powerful, scalable web/proxy server.&lt;/p&gt;
&lt;p&gt;NGINX has a buffer overflow for years that exceed four digits, as demonstrated
by a file with a modification date in 1969 that causes an integer overflow (or
a false modification date far in the future), when encountered by the autoindex
module.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-440-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-440-1-python-django/</link>
      <pubDate>Sun, 06 Jun 2021 10:50:03 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-440-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-440-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33203&#34;&gt;CVE-2021-33203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-33571&#34;&gt;CVE-2021-33571&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues were discovered in Django, the Python-based web development
framework:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;* CVE-2021-33203: Potential directory traversal via admindocs

  Staff members could use the admindocs TemplateDetailView view to
  check the existence of arbitrary files. Additionally, if (and only if) the
  default admindocs templates have been customized by the developers to also
  expose the file contents, then not only the existence but also the file
  contents would have been exposed.

  As a mitigation, path sanitation is now applied and only files within the
  template root directories can be loaded.

  This issue has low severity, according to the Django security policy.

  Thanks to Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen from the CodeQL
  Python team for the report.

* CVE-2021-33571: Possible indeterminate SSRF, RFI, and LFI attacks
  since validators accepted leading zeros in IPv4 addresses

  URLValidator, validate_ipv4_address(), and validate_ipv46_address() didn&amp;#39;t
  prohibit leading zeros in octal literals. If you used such values you could
  suffer from indeterminate SSRF, RFI, and LFI attacks.

  validate_ipv4_address() and validate_ipv46_address() validators were not
  affected on Python 3.9.5+.

  This issue has medium severity, according to the Django security policy.
&lt;/code&gt;&lt;/pre&gt;
      </description>
    </item>
    
    
    
    <item>
      <title>ELA-439-1 isc-dhcp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-439-1-isc-dhcp/</link>
      <pubDate>Thu, 03 Jun 2021 14:03:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-439-1-isc-dhcp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-439-1-isc-dhcp/">
      
&lt;p&gt;Package : isc-dhcp&lt;/p&gt;


&lt;p&gt;Version : 4.3.1-6&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25217&#34;&gt;CVE-2021-25217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jon Franklin and Pawel Wieczorkiewicz found an issue in the ISC DHCP
client and server when parsing lease information, which could lead to
denial of service via application crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-438-1 ruby-nokogiri security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-438-1-ruby-nokogiri/</link>
      <pubDate>Tue, 01 Jun 2021 00:18:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-438-1-ruby-nokogiri/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-438-1-ruby-nokogiri/">
      
&lt;p&gt;Package : ruby-nokogiri&lt;/p&gt;


&lt;p&gt;Version : 1.6.3.1&amp;#43;ds-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26247&#34;&gt;CVE-2020-26247&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath
and CSS selector support. An XXE vulnerability was found in Nokogiri. XML
Schemas parsed by Nokogiri::XML::Schema were trusted by default, allowing
external resources to be accessed over the network, potentially enabling XXE or
SSRF attacks. The new default behavior is to treat all input as untrusted. See
also &lt;a href=&#34;https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m&#34;&gt;upstream&amp;rsquo;s security
advisory&lt;/a&gt;
for more information how to mitigate the problem or to restore the old behavior
again.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-437-1 nginx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-437-1-nginx/</link>
      <pubDate>Sun, 30 May 2021 18:22:59 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-437-1-nginx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-437-1-nginx/">
      
&lt;p&gt;Package : nginx&lt;/p&gt;


&lt;p&gt;Version : 1.6.2-5&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23017&#34;&gt;CVE-2021-23017&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Luis Merino, Markus Vervier and Eric Sesterhenn discovered an off-by-one
in Nginx, a high-performance web and reverse proxy server, which could
result in denial of service and potentially the execution of arbitrary
code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-436-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-436-1-libxml2/</link>
      <pubDate>Sun, 30 May 2021 09:58:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-436-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-436-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3541&#34;&gt;CVE-2021-3541&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libxml2, the GNOME XML library.&lt;/p&gt;
&lt;p&gt;This issue is called &amp;ldquo;Parameter Laughs&amp;rdquo;-attack and is related to parameter
entities expansion.
It is similar to the &amp;ldquo;Billion Laughs&amp;rdquo;-attacks found earlier in libexpat.
More information can be found at [1]&lt;/p&gt;
&lt;p&gt;[1] &lt;a href=&#34;https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/&#34;&gt;https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-435-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-435-1-python2.7/</link>
      <pubDate>Sun, 30 May 2021 00:00:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-435-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-435-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1-1&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23336&#34;&gt;CVE-2021-23336&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in Python2.7, an interactive high-level object-oriented language.&lt;/p&gt;
&lt;p&gt;Python2.7 is vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Attention, API-change!&lt;/strong&gt; Please be sure your software is working properly if it uses &lt;code&gt;urllib.parse.parse_qs&lt;/code&gt; or &lt;code&gt;urllib.parse.parse_qsl&lt;/code&gt;, &lt;code&gt;cgi.parse&lt;/code&gt; or &lt;code&gt;cgi.parse_multipart&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Earlier Python versions allowed using both &lt;code&gt;;&lt;/code&gt; and &lt;code&gt;&amp;amp;&lt;/code&gt; as query parameter separators in &lt;code&gt;urllib.parse.parse_qs&lt;/code&gt; and &lt;code&gt;urllib.parse.parse_qsl&lt;/code&gt;. Due to security concerns, and to conform with newer W3C recommendations, this has been changed to allow only a single separator key, with &lt;code&gt;&amp;amp;&lt;/code&gt; as the default. This change also affects &lt;code&gt;cgi.parse&lt;/code&gt; and &lt;code&gt;cgi.parse_multipart&lt;/code&gt; as they use the affected functions internally. For more details, please see their respective documentation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-434-1 djvulibre security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-434-1-djvulibre/</link>
      <pubDate>Wed, 26 May 2021 17:29:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-434-1-djvulibre/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-434-1-djvulibre/">
      
&lt;p&gt;Package : djvulibre&lt;/p&gt;


&lt;p&gt;Version : 3.5.25.4-4&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3500&#34;&gt;CVE-2021-3500&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32490&#34;&gt;CVE-2021-32490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32491&#34;&gt;CVE-2021-32491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32492&#34;&gt;CVE-2021-32492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-32493&#34;&gt;CVE-2021-32493&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in djvulibre, a library and
set of tools to handle documents in the DjVu format. An attacker could
crash document viewers and possibly execute arbitrary code through
crafted DjVu files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-433-1 libx11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-433-1-libx11/</link>
      <pubDate>Mon, 24 May 2021 08:51:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-433-1-libx11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-433-1-libx11/">
      
&lt;p&gt;Package : libx11&lt;/p&gt;


&lt;p&gt;Version : 2:1.6.2-3&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31535&#34;&gt;CVE-2021-31535&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Roman Fiedler found that libX11, the X11 protocol client library, was
vulnerable to protocol command injection due to insufficient validation
of arguments to some functions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-432-1 tomcat7 bug fix update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-432-1-tomcat7/</link>
      <pubDate>Sat, 22 May 2021 19:19:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-432-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-432-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.109-1&lt;/p&gt;


      &lt;p&gt;This update of the Tomcat 7 Servlet and JSP engine fixes upstream bug
&lt;a href=&#34;https://bz.apache.org/bugzilla/show_bug.cgi?id=64021&#34;&gt;BZ 64021&lt;/a&gt;.
Under certain circumstances the ServletContainerInitializer (SCI)
of a web application was unable to find Tomcat&amp;rsquo;s WebSocket support as the
latter was initialised after any application SCIs. This could prevent services
from being executed.&lt;/p&gt;
&lt;p&gt;We recommend that you upgrade your Tomcat 7 packages if you are affected by
upstream bug BZ 64021. Otherwise an upgrade is not necessary.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-431-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-431-1-curl/</link>
      <pubDate>Mon, 17 May 2021 16:18:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-431-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-431-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22876&#34;&gt;CVE-2021-22876&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Viktor Szakats reported that libcurl, an URL transfer library, does
not strip off user credentials from the URL when automatically
populating the Referer HTTP request header field in outgoing HTTP
requests. Sensitive authentication data may leak to the server that is
the target of the second HTTP request.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-430-1 libimage-exiftool-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-430-1-libimage-exiftool-perl/</link>
      <pubDate>Sun, 16 May 2021 15:05:01 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-430-1-libimage-exiftool-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-430-1-libimage-exiftool-perl/">
      
&lt;p&gt;Package : libimage-exiftool-perl&lt;/p&gt;


&lt;p&gt;Version : 9.74-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22204&#34;&gt;CVE-2021-22204&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in libimage-exiftool-perl, a library and
program to read and write meta information in multimedia files, which
may result in execution of arbitrary code if a malformed DjVu file is
processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-429-1 jetty security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-429-1-jetty/</link>
      <pubDate>Fri, 14 May 2021 14:36:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-429-1-jetty/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-429-1-jetty/">
      
&lt;p&gt;Package : jetty&lt;/p&gt;


&lt;p&gt;Version : 6.1.26-4&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9735&#34;&gt;CVE-2017-9735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10247&#34;&gt;CVE-2019-10247&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that jetty, a Java servlet engine and webserver, is
vulnerable to a timing attack and an information leak. An attacker
might reveal cryptographic credentials such as passwords to a local
user, or disclose webapps installation path.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-428-1 graphviz security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-428-1-graphviz/</link>
      <pubDate>Thu, 13 May 2021 15:10:11 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-428-1-graphviz/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-428-1-graphviz/">
      
&lt;p&gt;Package : graphviz&lt;/p&gt;


&lt;p&gt;Version : 2.38.0-7&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10196&#34;&gt;CVE-2018-10196&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-18032&#34;&gt;CVE-2020-18032&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-10196&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference vulnerability in the rebuild_vlists
function in lib/dotgen/conc.c in the dotgen library allows
remote attackers to cause a denial of service (application
crash) via a crafted file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-18032&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow was discovered in Graphviz, which could
potentially result in the execution of arbitrary code when
processing a malformed file.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-427-1 lz4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-427-1-lz4/</link>
      <pubDate>Wed, 12 May 2021 11:01:11 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-427-1-lz4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-427-1-lz4/">
      
&lt;p&gt;Package : lz4&lt;/p&gt;


&lt;p&gt;Version : 0.0~r122-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3520&#34;&gt;CVE-2021-3520&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential memory corruption vulnerability in
the &lt;code&gt;lz4&lt;/code&gt; compression algorithm library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-426-1 hivex security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-426-1-hivex/</link>
      <pubDate>Wed, 12 May 2021 03:31:32 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-426-1-hivex/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-426-1-hivex/">
      
&lt;p&gt;Package : hivex&lt;/p&gt;


&lt;p&gt;Version : 1.3.10-2&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3504&#34;&gt;CVE-2021-3504&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jemery Galindo discovered an out-of-bounds memory access in Hivex, a
library to parse Windows Registry hive files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-425-1 rails security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-425-1-rails/</link>
      <pubDate>Wed, 12 May 2021 02:17:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-425-1-rails/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-425-1-rails/">
      
&lt;p&gt;Package : rails&lt;/p&gt;


&lt;p&gt;Version : 2:4.1.8-1&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22885&#34;&gt;CVE-2021-22885&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-22904&#34;&gt;CVE-2021-22904&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2021-22885&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a possible information disclosure/unintended method
execution vulnerability in Action Pack when using the
`redirect_to` or `polymorphic_url` helper with untrusted user
input.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-22904&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a possible DoS vulnerability in the Token Authentication
logic in Action Controller. Impacted code uses
`authenticate_or_request_with_http_token` or
`authenticate_with_http_token` for request authentication.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-424-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-424-1-libxml2/</link>
      <pubDate>Mon, 10 May 2021 14:30:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-424-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-424-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3517&#34;&gt;CVE-2021-3517&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3518&#34;&gt;CVE-2021-3518&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3537&#34;&gt;CVE-2021-3537&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in libxml2, a library providing
support to read, modify and write XML and HTML files, which could cause
denial of service via application crash when parsing specially crafted
files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-423-1 libwebp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-423-1-libwebp/</link>
      <pubDate>Sun, 09 May 2021 20:49:47 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-423-1-libwebp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-423-1-libwebp/">
      
&lt;p&gt;Package : libwebp&lt;/p&gt;


&lt;p&gt;Version : 0.4.1-1.2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25009&#34;&gt;CVE-2018-25009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25010&#34;&gt;CVE-2018-25010&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25011&#34;&gt;CVE-2018-25011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25012&#34;&gt;CVE-2018-25012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25013&#34;&gt;CVE-2018-25013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-25014&#34;&gt;CVE-2018-25014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36328&#34;&gt;CVE-2020-36328&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36329&#34;&gt;CVE-2020-36329&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36330&#34;&gt;CVE-2020-36330&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36331&#34;&gt;CVE-2020-36331&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were discovered in libwebp, a lossy
compression library for digital photographic images. Heap-based buffer overflows may
lead to a denial-of-service or potentially the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-422-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-422-1-samba/</link>
      <pubDate>Sat, 08 May 2021 20:00:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-422-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-422-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:4.2.14&amp;#43;dfsg-0&amp;#43;deb8u15&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20254&#34;&gt;CVE-2021-20254&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Peter Eriksson of Linköping University discovered a flaw in the smbd file
server which maps Windows group identities (SIDs) into unix group ids (gids).
The code that performs this had a flaw that could allow it to read data beyond
the end of the array in the case where a negative cache entry had been added to
the mapping cache. This could cause the calling code to return those values
into the process token that stores the group membership for a user. The
vulnerability could allow unauthorized access to files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-421-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-421-1-python-django/</link>
      <pubDate>Thu, 06 May 2021 12:51:47 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-421-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-421-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-31542&#34;&gt;CVE-2021-31542&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was potential directory-traversal vulnerability in
Django, a popular Python-based web development framework.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;MultiPartParser&lt;/code&gt;, &lt;code&gt;UploadedFile&lt;/code&gt; and &lt;code&gt;FieldFile&lt;/code&gt; classes allowed
directory-traversal via uploaded files with suitably crafted file names. In
order to mitigate this risk, stricter &lt;code&gt;basename&lt;/code&gt; and path sanitation is now
applied. Specifically, empty file names and paths with dot segments are
rejected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-420-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-420-1-exim4/</link>
      <pubDate>Wed, 05 May 2021 16:23:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-420-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-420-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.84.2-2&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28007&#34;&gt;CVE-2020-28007&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28008&#34;&gt;CVE-2020-28008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28009&#34;&gt;CVE-2020-28009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28011&#34;&gt;CVE-2020-28011&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28012&#34;&gt;CVE-2020-28012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28013&#34;&gt;CVE-2020-28013&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28014&#34;&gt;CVE-2020-28014&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28015&#34;&gt;CVE-2020-28015&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28017&#34;&gt;CVE-2020-28017&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28020&#34;&gt;CVE-2020-28020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28021&#34;&gt;CVE-2020-28021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28022&#34;&gt;CVE-2020-28022&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28024&#34;&gt;CVE-2020-28024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28025&#34;&gt;CVE-2020-28025&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Research Labs reported several vulnerabilities in Exim, a mail
transport agent, which could result in local privilege escalation and
remote code execution.&lt;/p&gt;
&lt;p&gt;Details can be found in the Qualys advisory at
&lt;a href=&#34;https://www.qualys.com/2021/05/04/21nails/21nails.txt&#34;&gt;https://www.qualys.com/2021/05/04/21nails/21nails.txt&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-419-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-419-1-imagemagick/</link>
      <pubDate>Tue, 04 May 2021 15:17:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-419-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-419-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u24&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20312&#34;&gt;CVE-2021-20312&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in ImageMagick, where an integer overflow in
WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a
crafted image file that is submitted by an attacker and processed by an
application using ImageMagick. This could lead to a denial-of-service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-418-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-418-1-bind9/</link>
      <pubDate>Tue, 04 May 2021 12:25:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-418-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-418-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25214&#34;&gt;CVE-2021-25214&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25215&#34;&gt;CVE-2021-25215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25216&#34;&gt;CVE-2021-25216&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in BIND, a DNS server
implementation.&lt;/p&gt;
&lt;p&gt;CVE-2021-25214&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Greg Kuechle discovered that a malformed incoming IXFR transfer
could trigger an assertion failure in named, resulting in denial
of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-25215&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Siva Kakarla discovered that named could crash when a DNAME record
placed in the ANSWER section during DNAME chasing turned out to be
the final answer to a client query.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-25216&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the SPNEGO implementation used by BIND is
prone to a buffer overflow vulnerability. This update switches to
use the SPNEGO implementation from the Kerberos libraries.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-417-1 gst-plugins-bad0.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-417-1-gst-plugins-bad0.10/</link>
      <pubDate>Tue, 27 Apr 2021 13:07:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-417-1-gst-plugins-bad0.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-417-1-gst-plugins-bad0.10/">
      
&lt;p&gt;Package : gst-plugins-bad0.10&lt;/p&gt;


&lt;p&gt;Version : 0.10.23-7.4&amp;#43;deb8u4&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework, which may result in denial of service or potentially
the execution of arbitrary code if a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-416-1 gst-plugins-base0.10 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-416-1-gst-plugins-base0.10/</link>
      <pubDate>Tue, 27 Apr 2021 13:05:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-416-1-gst-plugins-base0.10/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-416-1-gst-plugins-base0.10/">
      
&lt;p&gt;Package : gst-plugins-base0.10&lt;/p&gt;


&lt;p&gt;Version : 0.10.36-2&amp;#43;deb8u3&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework, which may result in denial of service or potentially
the execution of arbitrary code if a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-415-1 gst-libav1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-415-1-gst-libav1.0/</link>
      <pubDate>Tue, 27 Apr 2021 12:50:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-415-1-gst-libav1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-415-1-gst-libav1.0/">
      
&lt;p&gt;Package : gst-libav1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework, which may result in denial of service or potentially
the execution of arbitrary code if a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-414-1 gst-plugins-ugly1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-414-1-gst-plugins-ugly1.0/</link>
      <pubDate>Tue, 27 Apr 2021 12:48:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-414-1-gst-plugins-ugly1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-414-1-gst-plugins-ugly1.0/">
      
&lt;p&gt;Package : gst-plugins-ugly1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u2&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework, which may result in denial of service or potentially
the execution of arbitrary code if a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-413-1 gst-plugins-bad1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-413-1-gst-plugins-bad1.0/</link>
      <pubDate>Tue, 27 Apr 2021 12:45:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-413-1-gst-plugins-bad1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-413-1-gst-plugins-bad1.0/">
      
&lt;p&gt;Package : gst-plugins-bad1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2.1&amp;#43;deb8u4&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework, which may result in denial of service or potentially
the execution of arbitrary code if a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-412-1 gst-plugins-base1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-412-1-gst-plugins-base1.0/</link>
      <pubDate>Tue, 27 Apr 2021 12:42:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-412-1-gst-plugins-base1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-412-1-gst-plugins-base1.0/">
      
&lt;p&gt;Package : gst-plugins-base1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u3&lt;/p&gt;


      &lt;p&gt;Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework, which may result in denial of service or potentially
the execution of arbitrary code if a malformed media file is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-411-1 python-bleach security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-411-1-python-bleach/</link>
      <pubDate>Mon, 26 Apr 2021 18:49:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-411-1-python-bleach/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-411-1-python-bleach/">
      
&lt;p&gt;Package : python-bleach&lt;/p&gt;


&lt;p&gt;Version : 1.4-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23980&#34;&gt;CVE-2021-23980&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that python-bleach, a whitelist-based
HTML-sanitizing library for the Python language, is prone to a
mutation XSS vulnerability in bleach.clean when &amp;lsquo;svg&amp;rsquo; or &amp;lsquo;math&amp;rsquo; are in
the allowed tags, &amp;lsquo;p&amp;rsquo; or &amp;lsquo;br&amp;rsquo; are in allowed tags, &amp;lsquo;style&amp;rsquo;, &amp;rsquo;title&amp;rsquo;,
&amp;rsquo;noscript&amp;rsquo;, &amp;lsquo;script&amp;rsquo;, &amp;rsquo;textarea&amp;rsquo;, &amp;rsquo;noframes&amp;rsquo;, &amp;lsquo;iframe&amp;rsquo;, or &amp;lsquo;xmp&amp;rsquo; are
in allowed tags and &amp;lsquo;strip_comments=False&amp;rsquo; is set.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-410-1 gst-plugins-good1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-410-1-gst-plugins-good1.0/</link>
      <pubDate>Mon, 26 Apr 2021 11:55:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-410-1-gst-plugins-good1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-410-1-gst-plugins-good1.0/">
      
&lt;p&gt;Package : gst-plugins-good1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3497&#34;&gt;CVE-2021-3497&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A use-after-free vulnerability was found in the Matroska plugin of the
the GStreamer media framework, which may result in denial of service or
potentially the execution of arbitrary code if a malformed media file
is opened.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-409-1 opendmarc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-409-1-opendmarc/</link>
      <pubDate>Sun, 25 Apr 2021 13:00:36 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-409-1-opendmarc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-409-1-opendmarc/">
      
&lt;p&gt;Package : opendmarc&lt;/p&gt;


&lt;p&gt;Version : 1.3.0&amp;#43;dfsg-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16378&#34;&gt;CVE-2019-16378&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12460&#34;&gt;CVE-2020-12460&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2019-16378
It was discovered that OpenDMARC, a milter implementation of DMARC, is
prone to a signature-bypass vulnerability with multiple From: addresses.&lt;/p&gt;
&lt;p&gt;CVE-2020-12460
It was discovered that OpenDMARC, a milter implementation of DMARC, has
improper null termination in the function opendmarc_xml_parse that can
result in a one-byte heap overflow in opendmarc_xml when parsing a
specially crafted DMARC aggregate report. This can cause remote memory
corruption when a &amp;lsquo;\0&amp;rsquo; byte overwrites the heap metadata of the next
chunk and its PREV_INUSE flag.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-408-1 libspring-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-408-1-libspring-java/</link>
      <pubDate>Fri, 23 Apr 2021 20:02:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-408-1-libspring-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-408-1-libspring-java/">
      
&lt;p&gt;Package : libspring-java&lt;/p&gt;


&lt;p&gt;Version : 3.0.6.RELEASE-17&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11039&#34;&gt;CVE-2018-11039&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Spring Framework allows web applications to change the HTTP
request method to any HTTP method (including TRACE) using the
HiddenHttpMethodFilter in Spring MVC. If an application has a
pre-existing XSS vulnerability, a malicious user (or attacker) can use
this filter to escalate to an XST (Cross Site Tracing) attack.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-407-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-407-1-openjdk-8/</link>
      <pubDate>Fri, 23 Apr 2021 13:34:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-407-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-407-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u292-b10-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2161&#34;&gt;CVE-2021-2161&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-2163&#34;&gt;CVE-2021-2163&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-406-1 zabbix security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-406-1-zabbix/</link>
      <pubDate>Wed, 21 Apr 2021 16:32:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-406-1-zabbix/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-406-1-zabbix/">
      
&lt;p&gt;Package : zabbix&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.23&amp;#43;dfsg-0&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15132&#34;&gt;CVE-2019-15132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11800&#34;&gt;CVE-2020-11800&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15803&#34;&gt;CVE-2020-15803&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Zabbix, a network
monitoring solution. An attacker may remotely execute code on the
zabbix server, enumerate valid users and redirect to external links
through the zabbix web frontend.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-15132&lt;/p&gt;
&lt;p&gt;Zabbix allows User Enumeration. With login requests, it is
possible to enumerate application usernames based on the
variability of server responses (e.g., the &amp;ldquo;Login name or password
is incorrect&amp;rdquo; and &amp;ldquo;No permissions for system access&amp;rdquo; messages, or
just blocking for a number of seconds). This affects both
api_jsonrpc.php and index.php.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-11800&lt;/p&gt;
&lt;p&gt;Zabbix allows remote attackers to execute arbitrary code on the
Zabbix server.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-15803&lt;/p&gt;
&lt;p&gt;Zabbix allows stored XSS in the URL Widget.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-405-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-405-1-xorg-server/</link>
      <pubDate>Thu, 15 Apr 2021 11:33:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-405-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-405-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3472&#34;&gt;CVE-2021-3472&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered that there was an input validation failure in the
&lt;a href=&#34;https://www.x.org/wiki/&#34;&gt;X.Org&lt;/a&gt; display server.&lt;/p&gt;
&lt;p&gt;Insufficient checks on the lengths of the XInput extension&amp;rsquo;s
ChangeFeedbackControl request could have lead to out of bounds memory accesses
in the X server. These issues can lead to privilege escalation for authorised
clients, particularly on systems where the X server is running as a privileged
user.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-404-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-404-1-clamav/</link>
      <pubDate>Wed, 14 Apr 2021 14:20:09 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-404-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-404-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.102.4&amp;#43;dfsg-0&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-1405&#34;&gt;CVE-2021-1405&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability in the email parsing module in Clam AntiVirus
(ClamAV) Software version 0.103.1 and all prior versions could
allow an unauthenticated, remote attacker to cause a denial of
service condition on an affected device. The vulnerability is
due to improper variable initialization that may result in an
NULL pointer read. An attacker could exploit this vulnerability
by sending a crafted email to an affected device. An exploit
could allow the attacker to cause the ClamAV scanning process
crash, resulting in a denial of service condition.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-403-1 jackson-databind security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-403-1-jackson-databind/</link>
      <pubDate>Wed, 14 Apr 2021 09:27:03 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-403-1-jackson-databind/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-403-1-jackson-databind/">
      
&lt;p&gt;Package : jackson-databind&lt;/p&gt;


&lt;p&gt;Version : 2.4.2-2&amp;#43;deb8u16&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24616&#34;&gt;CVE-2020-24616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24750&#34;&gt;CVE-2020-24750&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25649&#34;&gt;CVE-2020-25649&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35490&#34;&gt;CVE-2020-35490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35491&#34;&gt;CVE-2020-35491&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35728&#34;&gt;CVE-2020-35728&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36179&#34;&gt;CVE-2020-36179&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36180&#34;&gt;CVE-2020-36180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36181&#34;&gt;CVE-2020-36181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36182&#34;&gt;CVE-2020-36182&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36183&#34;&gt;CVE-2020-36183&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36184&#34;&gt;CVE-2020-36184&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36185&#34;&gt;CVE-2020-36185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36186&#34;&gt;CVE-2020-36186&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36187&#34;&gt;CVE-2020-36187&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36188&#34;&gt;CVE-2020-36188&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36189&#34;&gt;CVE-2020-36189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20190&#34;&gt;CVE-2021-20190&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were found in Jackson Databind.&lt;/p&gt;
&lt;p&gt;CVE-2020-24616&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the
 interaction between serialization gadgets and typing, related
 to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24750&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the
interaction between serialization gadgets and typing, related
to com.pastdev.httpcomponents.configuration.JndiConfiguration.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25649&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in FasterXML Jackson Databind, where it did not
have entity expansion secured properly. This flaw allows
vulnerability to XML external entity (XXE) attacks. The highest
threat from this vulnerability is data integrity.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35491&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-35728&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
(aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36179&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36180&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36181&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36182&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36183&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related
to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36184&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36185&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36186&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36187&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36188&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36189&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the
interaction between serialization gadgets and typing, related to
com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20190&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in jackson-databind before 2.9.10.7. FasterXML
mishandles the interaction between serialization gadgets and
typing. The highest threat from this vulnerability is to data
confidentiality and integrity as well as system availability.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-402-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-402-1-python-django/</link>
      <pubDate>Fri, 09 Apr 2021 16:18:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-402-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-402-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28658&#34;&gt;CVE-2021-28658&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential directory traversal issue in
Django, a Python-based web development framework.&lt;/p&gt;
&lt;p&gt;The vulnerability could have been exploited by maliciously crafted filenames.
However, the upload handlers built into Django itself were not affected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-401-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-401-1-tomcat7/</link>
      <pubDate>Fri, 09 Apr 2021 12:46:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-401-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-401-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.100-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25329&#34;&gt;CVE-2021-25329&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the fix for CVE-2020-9484 was incomplete. When using
Apache Tomcat with a configuration edge case that was highly unlikely to be
used, the Tomcat instance was still vulnerable to CVE-2020-9484. Note that both
the previously published prerequisites for CVE-2020-9484 and the previously
published mitigations for CVE-2020-9484 also apply to this issue.&lt;/p&gt;
&lt;p&gt;For reference the original advisory text follows.&lt;/p&gt;
&lt;p&gt;When using Apache Tomcat if a) an attacker is able to control the contents and
name of a file on the server; and b) the server is configured to use the
PersistenceManager with a FileStore; and c) the PersistenceManager is
configured with sessionAttributeValueClassNameFilter=“null” (the default unless
a SecurityManager is used) or a sufficiently lax filter to allow the attacker
provided object to be deserialized; and d) the attacker knows the relative file
path from the storage location used by FileStore to the file the attacker has
control over; then, using a specifically crafted request, the attacker will be
able to trigger remote code execution via deserialization of the file under
their control. Note that all of conditions a) to d) must be true for the attack
to succeed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-400-1 wordpress security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-400-1-wordpress/</link>
      <pubDate>Mon, 05 Apr 2021 03:35:41 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-400-1-wordpress/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-400-1-wordpress/">
      
&lt;p&gt;Package : wordpress&lt;/p&gt;


&lt;p&gt;Version : 4.1.32&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25286&#34;&gt;CVE-2020-25286&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28032&#34;&gt;CVE-2020-28032&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28033&#34;&gt;CVE-2020-28033&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28034&#34;&gt;CVE-2020-28034&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28035&#34;&gt;CVE-2020-28035&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28036&#34;&gt;CVE-2020-28036&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28037&#34;&gt;CVE-2020-28037&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28038&#34;&gt;CVE-2020-28038&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28039&#34;&gt;CVE-2020-28039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28040&#34;&gt;CVE-2020-28040&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There were several vulnerabilities reported against wordpress,
as follows:&lt;/p&gt;
&lt;p&gt;CVE-2020-25286&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In wp-includes/comment-template.php in WordPress before 4.1.32
comments from a post or page could sometimes be seen in the
latest comments even if the post or page was not public.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28032&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WordPress before 4.1.32 mishandles deserialization requests in
wp-includes/Requests/Utility/FilteredIterator.php.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28033&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WordPress before 4.1.32 mishandles embeds from disabled sites
on a multisite network, as demonstrated by allowing a spam
embed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28034&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WordPress before 4.1.32 allows XSS associated with global
variables.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28035&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WordPress before 4.1.32 allows attackers to gain privileges via
XML-RPC.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28036&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;wp-includes/class-wp-xmlrpc-server.php in WordPress before
4.1.32 allows attackers to gain privileges by using XML-RPC to
comment on a post.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28037&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;is_blog_installed in wp-includes/functions.php in WordPress
before 4.1.32 improperly determines whether WordPress is
already installed, which might allow an attacker to perform
a new installation, leading to remote code execution (as well
as a denial of service for the old installation).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28038&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WordPress before 4.1.32 allows stored XSS via post slugs.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28039&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;is_protected_meta in wp-includes/meta.php in WordPress before
4.1.32 allows arbitrary file deletion because it does not
properly determine whether a meta key is considered protected.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28040&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;WordPress before 4.1.32 allows CSRF attacks that change a
theme&#39;s background image.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-399-1 php-nette security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-399-1-php-nette/</link>
      <pubDate>Sun, 04 Apr 2021 11:14:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-399-1-php-nette/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-399-1-php-nette/">
      
&lt;p&gt;Package : php-nette&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15227&#34;&gt;CVE-2020-15227&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;php-nette, a PHP MVC framework, is vulnerable to a code injection attack by
passing specially formed parameters to URL that may possibly leading to remote
code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-398-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-398-1-libxstream-java/</link>
      <pubDate>Sat, 03 Apr 2021 19:28:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-398-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-398-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21341&#34;&gt;CVE-2021-21341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21342&#34;&gt;CVE-2021-21342&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21343&#34;&gt;CVE-2021-21343&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21344&#34;&gt;CVE-2021-21344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21345&#34;&gt;CVE-2021-21345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21346&#34;&gt;CVE-2021-21346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21347&#34;&gt;CVE-2021-21347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21348&#34;&gt;CVE-2021-21348&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21349&#34;&gt;CVE-2021-21349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21350&#34;&gt;CVE-2021-21350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-21351&#34;&gt;CVE-2021-21351&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In XStream there is a vulnerability which may allow a remote attacker to
load and execute arbitrary code from a remote host only by manipulating the
processed input stream.&lt;/p&gt;
&lt;p&gt;The type hierarchies for java.io.InputStream, java.nio.channels.Channel,
javax.activation.DataSource and javax.sql.rowsel.BaseRowSet are now
blacklisted as well as the individual types
com.sun.corba.se.impl.activation.ServerTableEntry,
com.sun.tools.javac.processing.JavacProcessingEnvironment$NameProcessIterator,
sun.awt.datatransfer.DataTransferer$IndexOrderComparator, and
sun.swing.SwingLazyValue. Additionally the internal type
Accessor$GetterSetterReflection of JAXB, the internal types
MethodGetter$PrivilegedGetter and ServiceFinder$ServiceNameIterator of
JAX-WS, all inner classes of javafx.collections.ObservableList and an
internal ClassLoader used in a private BCEL copy are now part of the
default blacklist and the deserialization of XML containing one of the two
types will fail. You will have to enable these types by explicit
configuration, if you need them.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-397-1 spamassassin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-397-1-spamassassin/</link>
      <pubDate>Fri, 02 Apr 2021 04:05:03 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-397-1-spamassassin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-397-1-spamassassin/">
      
&lt;p&gt;Package : spamassassin&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-0&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1946&#34;&gt;CVE-2020-1946&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Damian Lukowski discovered a flaw in spamassassin, a Perl-based spam
filter using text analysis. Malicious rule configuration files, possibly
downloaded from an updates server, could execute arbitrary commands
under multiple scenarios.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-396-1 underscore security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-396-1-underscore/</link>
      <pubDate>Fri, 02 Apr 2021 02:45:58 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-396-1-underscore/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-396-1-underscore/">
      
&lt;p&gt;Package : underscore&lt;/p&gt;


&lt;p&gt;Version : 1.7.0~dfsg-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23358&#34;&gt;CVE-2021-23358&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that missing input sanitising in the template()
function of the Underscore JavaScript library could result in the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-395-1 busybox security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-395-1-busybox/</link>
      <pubDate>Thu, 01 Apr 2021 20:09:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-395-1-busybox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-395-1-busybox/">
      
&lt;p&gt;Package : busybox&lt;/p&gt;


&lt;p&gt;Version : 1:1.22.0-9&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28831&#34;&gt;CVE-2021-28831&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The gunzip decompressor of Busybox, tiny utilities for small and embedded
systems, mishandled the error bit on the huft_build result pointer, with a
resultant invalid free or segmentation fault, via malformed gzip data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-392-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-392-1-qemu/</link>
      <pubDate>Wed, 31 Mar 2021 19:07:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-392-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-392-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3409&#34;&gt;CVE-2021-3409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3416&#34;&gt;CVE-2021-3416&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20203&#34;&gt;CVE-2021-20203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20255&#34;&gt;CVE-2021-20255&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20257&#34;&gt;CVE-2021-20257&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in QEMU, a fast processor
emulator.&lt;/p&gt;
&lt;p&gt;CVE-2021-20257&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;net: e1000: infinite loop while processing transmit descriptors
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20255&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A stack overflow via an infinite recursion vulnerability was found in the
eepro100 i8255x device emulator of QEMU. This issue occurs while processing
controller commands due to a DMA reentry issue. This flaw allows a guest
user or process to consume CPU cycles or crash the QEMU process on the
host, resulting in a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-20203&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU
for versions up to v5.2.0. It may occur if a guest was to supply invalid
values for rx/tx queue size or other NIC parameters. A privileged guest
user may use this flaw to crash the QEMU process on the host resulting in
DoS scenario.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3416&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential stack overflow via infinite loop issue was found in various NIC
emulators of QEMU in versions up to and including 5.2.0. The issue occurs
in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A
guest user/process may use this flaw to consume CPU cycles or crash the
QEMU process on the host resulting in DoS scenario.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3409&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective,
thus making QEMU vulnerable to the out-of-bounds read/write access issues
previously found in the SDHCI controller emulation code. This flaw allows a
malicious privileged guest to crash the QEMU process on the host, resulting
in a denial of service or potential code execution.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-394-1 leptonlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-394-1-leptonlib/</link>
      <pubDate>Wed, 31 Mar 2021 11:47:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-394-1-leptonlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-394-1-leptonlib/">
      
&lt;p&gt;Package : leptonlib&lt;/p&gt;


&lt;p&gt;Version : 1.71-2.1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36277&#34;&gt;CVE-2020-36277&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36278&#34;&gt;CVE-2020-36278&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36279&#34;&gt;CVE-2020-36279&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36281&#34;&gt;CVE-2020-36281&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in leptonlib, an image processing library.&lt;/p&gt;
&lt;p&gt;All issues are related to heap-based buffer over-read in several functions or a denial of service (application crash) with crafted data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-393-1 ldb security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-393-1-ldb/</link>
      <pubDate>Wed, 31 Mar 2021 11:07:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-393-1-ldb/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-393-1-ldb/">
      
&lt;p&gt;Package : ldb&lt;/p&gt;


&lt;p&gt;Version : 2:1.1.20-0&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27840&#34;&gt;CVE-2020-27840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20277&#34;&gt;CVE-2021-20277&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in ldb, an LDAP-like embedded database, for example used with samba.&lt;/p&gt;
&lt;p&gt;Both issues are related to out of bounds access, either an out of bound read or a heap corrupton, both most likely leading to an application crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-391-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-391-1-jasper/</link>
      <pubDate>Sat, 27 Mar 2021 17:34:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-391-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-391-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-debian1-2.4&amp;#43;deb8u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3443&#34;&gt;CVE-2021-3443&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3467&#34;&gt;CVE-2021-3467&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in jasper, a JPEG-2000 runtime library.
Both issues are related to jpeg 2000 decoding, where a null pointer
dereference and a missing check of valid component numbers referenced
by CDEF box, could be exploited.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-390-1 lxml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-390-1-lxml/</link>
      <pubDate>Wed, 24 Mar 2021 19:07:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-390-1-lxml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-390-1-lxml/">
      
&lt;p&gt;Package : lxml&lt;/p&gt;


&lt;p&gt;Version : 3.4.0-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28957&#34;&gt;CVE-2021-28957&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in lxml, a pythonic binding for the libxml2 and libxslt libraries.
Due to missing input sanitization, XSS is possible for the HTML5 formaction attribute.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-389-1 dnsmasq security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-389-1-dnsmasq/</link>
      <pubDate>Mon, 22 Mar 2021 19:11:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-389-1-dnsmasq/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-389-1-dnsmasq/">
      
&lt;p&gt;Package : dnsmasq&lt;/p&gt;


&lt;p&gt;Version : 2.72-3&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25681&#34;&gt;CVE-2020-25681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25682&#34;&gt;CVE-2020-25682&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25683&#34;&gt;CVE-2020-25683&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25684&#34;&gt;CVE-2020-25684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25687&#34;&gt;CVE-2020-25687&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Moshe Kol and Shlomi Oberman of JSOF discovered several
vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP
server. They could result in denial of service, cache poisoning or the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-388-1 zeromq3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-388-1-zeromq3/</link>
      <pubDate>Mon, 22 Mar 2021 15:07:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-388-1-zeromq3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-388-1-zeromq3/">
      
&lt;p&gt;Package : zeromq3&lt;/p&gt;


&lt;p&gt;Version : 4.0.5&amp;#43;dfsg-2&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20234&#34;&gt;CVE-2021-20234&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in zeromq3, a lightweight messaging kernel.
When processing a delimiter in a pipe, that is not in an active state but still contains a message, this message is leaked.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-387-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-387-1-imagemagick/</link>
      <pubDate>Sun, 21 Mar 2021 22:46:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-387-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-387-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u23&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25666&#34;&gt;CVE-2020-25666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25675&#34;&gt;CVE-2020-25675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25676&#34;&gt;CVE-2020-25676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27754&#34;&gt;CVE-2020-27754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27757&#34;&gt;CVE-2020-27757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27758&#34;&gt;CVE-2020-27758&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27759&#34;&gt;CVE-2020-27759&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27761&#34;&gt;CVE-2020-27761&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27762&#34;&gt;CVE-2020-27762&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27764&#34;&gt;CVE-2020-27764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27766&#34;&gt;CVE-2020-27766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27767&#34;&gt;CVE-2020-27767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27768&#34;&gt;CVE-2020-27768&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27769&#34;&gt;CVE-2020-27769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27770&#34;&gt;CVE-2020-27770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27771&#34;&gt;CVE-2020-27771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27772&#34;&gt;CVE-2020-27772&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27774&#34;&gt;CVE-2020-27774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27775&#34;&gt;CVE-2020-27775&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20176&#34;&gt;CVE-2021-20176&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20241&#34;&gt;CVE-2021-20241&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20244&#34;&gt;CVE-2021-20244&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20246&#34;&gt;CVE-2021-20246&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were fixed in Imagemagick. Missing or
incomplete input sanitising may lead to undefined behavior which can result in
denial of service (application crash) or other unspecified impact.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-386-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-386-1-tomcat8/</link>
      <pubDate>Sun, 21 Mar 2021 22:41:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-386-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-386-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25329&#34;&gt;CVE-2021-25329&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the fix for CVE-2020-9484 was incomplete. When using
Apache Tomcat with a configuration edge case that was highly unlikely to be
used, the Tomcat instance was still vulnerable to CVE-2020-9484. Note that both
the previously published prerequisites for CVE-2020-9484 and the previously
published mitigations for CVE-2020-9484 also apply to this issue.&lt;/p&gt;
&lt;p&gt;For reference the original advisory text follows.&lt;/p&gt;
&lt;p&gt;When using Apache Tomcat if a) an attacker is able to control the contents and
name of a file on the server; and b) the server is configured to use the
PersistenceManager with a FileStore; and c) the PersistenceManager is
configured with sessionAttributeValueClassNameFilter=&amp;ldquo;null&amp;rdquo; (the default unless
a SecurityManager is used) or a sufficiently lax filter to allow the attacker
provided object to be deserialized; and d) the attacker knows the relative file
path from the storage location used by FileStore to the file the attacker has
control over; then, using a specifically crafted request, the attacker will be
able to trigger remote code execution via deserialization of the file under
their control. Note that all of conditions a) to d) must be true for the attack
to succeed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-363-2 xterm regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-363-2-xterm/</link>
      <pubDate>Sun, 21 Mar 2021 14:48:02 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-363-2-xterm/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-363-2-xterm/">
      
&lt;p&gt;Package : xterm&lt;/p&gt;


&lt;p&gt;Version : 312-2&amp;#43;deb8u2&lt;/p&gt;


      &lt;p&gt;ELA 363-1 backported a part of the upstream patch which fails
to deal with the realloc failures in Debian stretch. This update
reverts that part of the patch since it&amp;rsquo;s not really needed and
just focuses on fixing CVE-2021-27135.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-385-1 shibboleth-sp2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-385-1-shibboleth-sp2/</link>
      <pubDate>Sat, 20 Mar 2021 08:57:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-385-1-shibboleth-sp2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-385-1-shibboleth-sp2/">
      
&lt;p&gt;Package : shibboleth-sp2&lt;/p&gt;


&lt;p&gt;Version : 2.5.3&amp;#43;dfsg-2&amp;#43;deb8u2&lt;/p&gt;


      &lt;p&gt;Toni Huttunen discovered that the Shibboleth service provider&amp;rsquo;s template
engine used to render error pages could be abused for phishing attacks.&lt;/p&gt;
&lt;p&gt;For additional information please refer to the upstream advisory at
&lt;a href=&#34;https://shibboleth.net/community/advisories/secadv_20210317.txt&#34;&gt;https://shibboleth.net/community/advisories/secadv_20210317.txt&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-384-1 pygments security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-384-1-pygments/</link>
      <pubDate>Fri, 19 Mar 2021 17:29:50 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-384-1-pygments/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-384-1-pygments/">
      
&lt;p&gt;Package : pygments&lt;/p&gt;


&lt;p&gt;Version : 2.0.1&amp;#43;dfsg-1.1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27291&#34;&gt;CVE-2021-27291&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a series of denial of service vulnerabilities
in Pygments, a popular syntax highlighting library for Python.&lt;/p&gt;
&lt;p&gt;A number of regular expressions had exponential or cubic worst-case complexity
which could cause a remote denial of service (DoS) when provided with malicious
input.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-383-1 pillow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-383-1-pillow/</link>
      <pubDate>Fri, 19 Mar 2021 11:57:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-383-1-pillow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-383-1-pillow/">
      
&lt;p&gt;Package : pillow&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-2&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35653&#34;&gt;CVE-2020-35653&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-25290&#34;&gt;CVE-2021-25290&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Pillow, a Python Imaging
Library. An attacker could cause a denial-of-service (DoS) with
crafted image files.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-35653&lt;/p&gt;
&lt;p&gt;PcxDecode has a buffer over-read when decoding a crafted PCX file
because the user-supplied stride value is trusted for buffer
calculations.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-25290&lt;/p&gt;
&lt;p&gt;In TiffDecode.c, there is a negative-offset memcpy with an invalid
size.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-382-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-382-1-squid3/</link>
      <pubDate>Fri, 19 Mar 2021 03:51:49 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-382-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-382-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25097&#34;&gt;CVE-2020-25097&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Due to improper input validation, Squid is vulnerable to an HTTP
Request Smuggling attack.&lt;/p&gt;
&lt;p&gt;This problem allows a trusted client to perform HTTP Request
Smuggling and access services otherwise forbidden by Squid
security controls.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-381-1 velocity-tools security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-381-1-velocity-tools/</link>
      <pubDate>Wed, 17 Mar 2021 16:38:10 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-381-1-velocity-tools/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-381-1-velocity-tools/">
      
&lt;p&gt;Package : velocity-tools&lt;/p&gt;


&lt;p&gt;Version : 2.0-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13959&#34;&gt;CVE-2020-13959&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a cross-site scripting (XSS) vulnerability in
&lt;code&gt;velocity-tools&lt;/code&gt;, a collection of useful tools for the &amp;ldquo;Velocity&amp;rdquo; template
engine.&lt;/p&gt;
&lt;p&gt;The default error page could be exploited to steal session cookies, perform
requests in the name of the victim, used for phishing attacks and many other
similar attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-380-1 velocity security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-380-1-velocity/</link>
      <pubDate>Wed, 17 Mar 2021 12:39:01 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-380-1-velocity/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-380-1-velocity/">
      
&lt;p&gt;Package : velocity&lt;/p&gt;


&lt;p&gt;Version : 1.7-4&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13936&#34;&gt;CVE-2020-13936&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential arbitrary code execution
vulnerability in Velocity, a Java-based template engine for writing web
applications. It could be exploited by applications which allowed untrusted
users to upload/modify templates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-379-1 golang security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-379-1-golang/</link>
      <pubDate>Sat, 13 Mar 2021 18:35:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-379-1-golang/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-379-1-golang/">
      
&lt;p&gt;Package : golang&lt;/p&gt;


&lt;p&gt;Version : 2:1.3.3-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-5739&#34;&gt;CVE-2015-5739&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-3959&#34;&gt;CVE-2016-3959&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15041&#34;&gt;CVE-2017-15041&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-1000098&#34;&gt;CVE-2017-1000098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7187&#34;&gt;CVE-2018-7187&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16873&#34;&gt;CVE-2018-16873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16874&#34;&gt;CVE-2018-16874&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16276&#34;&gt;CVE-2019-16276&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17596&#34;&gt;CVE-2019-17596&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16845&#34;&gt;CVE-2020-16845&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3114&#34;&gt;CVE-2021-3114&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Go programming
language. An attacker could trigger a denial-of-service (DoS), bypasss
access control, and execute arbitrary code on the developer&amp;rsquo;s
computer.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2016-3959&lt;/p&gt;
&lt;p&gt;The Verify function in crypto/dsa/dsa.go does not properly check
parameters passed to the big integer library, which might allow
remote attackers to cause a denial of service (infinite loop) via
a crafted public key to a program that uses HTTPS client
certificates or SSH server libraries.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-15041&lt;/p&gt;
&lt;p&gt;Go allows &amp;ldquo;go get&amp;rdquo; remote command execution. Using custom domains,
it is possible to arrange things so that example.com/pkg1 points
to a Subversion repository but example.com/pkg1/pkg2 points to a
Git repository. If the Subversion repository includes a Git
checkout in its pkg2 directory and some other work is done to
ensure the proper ordering of operations, &amp;ldquo;go get&amp;rdquo; can be tricked
into reusing this Git checkout for the fetch of code from pkg2. If
the Subversion repository&amp;rsquo;s Git checkout has malicious commands in
.git/hooks/, they will execute on the system running &amp;ldquo;go get.&amp;rdquo;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-1000098&lt;/p&gt;
&lt;p&gt;The net/http package&amp;rsquo;s Request.ParseMultipartForm method starts
writing to temporary files once the request body size surpasses
the given &amp;ldquo;maxMemory&amp;rdquo; limit. It was possible for an attacker to
generate a multipart request crafted such that the server ran out
of file descriptors.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-7187&lt;/p&gt;
&lt;p&gt;The &amp;ldquo;go get&amp;rdquo; implementation in Go 1.9.4, when the -insecure
command-line option is used, does not validate the import path
(get/vcs.go only checks for &amp;ldquo;://&amp;rdquo; anywhere in the string), which
allows remote attackers to execute arbitrary OS commands via a
crafted web site.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-16873&lt;/p&gt;
&lt;p&gt;The &amp;ldquo;go get&amp;rdquo; command is vulnerable to remote code execution when
executed with the -u flag and the import path of a malicious Go
package, as it may treat the parent directory as a Git repository
root, containing malicious configuration.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-16874&lt;/p&gt;
&lt;p&gt;The &amp;ldquo;go get&amp;rdquo; command is vulnerable to directory traversal when
executed with the import path of a malicious Go package which
contains curly braces (both &amp;lsquo;{&amp;rsquo; and &amp;lsquo;}&amp;rsquo; characters). The attacker
can cause an arbitrary filesystem write, which can lead to code
execution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2015-5739&lt;/p&gt;
&lt;p&gt;The net/http library in net/textproto/reader.go does not properly
parse HTTP header keys, which allows remote attackers to conduct
HTTP request smuggling attacks via a space instead of a hyphen,
as demonstrated by &amp;ldquo;Content Length&amp;rdquo; instead of &amp;ldquo;Content-Length.&amp;rdquo;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-16276&lt;/p&gt;
&lt;p&gt;Go allows HTTP Request Smuggling.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-17596&lt;/p&gt;
&lt;p&gt;Go can panic upon an attempt to process network traffic containing
an invalid DSA public key. There are several attack scenarios,
such as traffic from a client to a server that verifies client
certificates.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-16845&lt;/p&gt;
&lt;p&gt;Go can have an infinite read loop in ReadUvarint and ReadVarint in
encoding/binary via invalid inputs.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-3114&lt;/p&gt;
&lt;p&gt;crypto/elliptic/p224.go can generate incorrect outputs, related to
an underflow of the lowest limb during the final complete
reduction in the P-224 field.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-378-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-378-1-linux-4.9/</link>
      <pubDate>Fri, 12 Mar 2021 17:32:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-378-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-378-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.258-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19318&#34;&gt;CVE-2019-19318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19813&#34;&gt;CVE-2019-19813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19816&#34;&gt;CVE-2019-19816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27815&#34;&gt;CVE-2020-27815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27825&#34;&gt;CVE-2020-27825&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28374&#34;&gt;CVE-2020-28374&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29568&#34;&gt;CVE-2020-29568&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29569&#34;&gt;CVE-2020-29569&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29660&#34;&gt;CVE-2020-29660&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29661&#34;&gt;CVE-2020-29661&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36158&#34;&gt;CVE-2020-36158&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3178&#34;&gt;CVE-2021-3178&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3347&#34;&gt;CVE-2021-3347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26930&#34;&gt;CVE-2021-26930&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26931&#34;&gt;CVE-2021-26931&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26932&#34;&gt;CVE-2021-26932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27363&#34;&gt;CVE-2021-27363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27364&#34;&gt;CVE-2021-27364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27365&#34;&gt;CVE-2021-27365&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-28038&#34;&gt;CVE-2021-28038&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2019-19318, CVE-2019-19813, CVE-2019-19816&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;Team bobfuzzer&amp;quot; reported bugs in Btrfs that could lead to a
use-after-free or heap buffer overflow, and could be triggered by
crafted filesystem images.  A user permitted to mount and access
arbitrary filesystems could use these to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27815&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was reported in the JFS filesystem code allowing a local
attacker with the ability to set extended attributes to cause a
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27825&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Adam &#39;pi3&#39; Zabrocki reported a use-after-free flaw in the ftrace
ring buffer resizing logic due to a race condition, which could
result in denial of service or information leak.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28374&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Disseldorp discovered that the LIO SCSI target implementation
performed insufficient checking in certain XCOPY requests. An
attacker with access to a LUN and knowledge of Unit Serial Number
assignments can take advantage of this flaw to read and write to any
LIO backstore, regardless of the SCSI transport settings.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-29568 (XSA-349)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Michael Kurth and Pawel Wieczorkiewicz reported that frontends can
trigger OOM in backends by updating a watched path.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-29569 (XSA-350)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Olivier Benjamin and Pawel Wieczorkiewicz reported a use-after-free
flaw which can be triggered by a block frontend in Linux blkback. A
misbehaving guest can trigger a dom0 crash by continuously
connecting / disconnecting a block frontend.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-29660&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a locking inconsistency issue in the tty
subsystem which may allow a local attacker to mount a
read-after-free attack against TIOCGSID.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-29661&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a locking issue in the tty subsystem which can
result in a use-after-free. A local attacker can take advantage of
this flaw for memory corruption or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-36158&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A buffer overflow flaw was discovered in the mwifiex WiFi driver
which could result in denial of service or the execution of
arbitrary code via a long SSID value.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3178&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;吴异 reported an information leak in the NFSv3 server.  When only
a subdirectory of a filesystem volume is exported, an NFS client
listing the exported directory would obtain a file handle to the
parent directory, allowing it to access files that were not meant
to be exported.

Even after this update, it is still possible for NFSv3 clients to
guess valid file handles and access files outside an exported
subdirectory, unless the &amp;quot;subtree_check&amp;quot; export option is enabled.
It is recommended that you do not use that option but only export
whole filesystem volumes.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-3347&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that PI futexes have a kernel stack use-after-free
during fault handling. An unprivileged user could use this flaw to
crash the kernel (resulting in denial of service) or for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-26930 (XSA-365)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan
H. Schönherr discovered that the Xen block backend driver
(xen-blkback) did not handle grant mapping errors correctly.  A
malicious guest could exploit this bug to cause a denial of
service (crash), or possibly an information leak or privilege
escalation, within the domain running the backend, which is
typically dom0.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-26931 (XSA-362), CVE-2021-26932 (XSA-361), CVE-2021-28038 (XSA-367)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jan Beulich discovered that the Xen support code and various Xen
backend drivers did not handle grant mapping errors correctly.  A
malicious guest could exploit these bugs to cause a denial of
service (crash) within the domain running the backend, which is
typically dom0.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-27363&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Adam Nichols reported that the iSCSI initiator subsystem did not
properly restrict access to transport handle attributes in sysfs.
On a system acting as an iSCSI initiator, this is an information
leak to local users and makes it easier to exploit CVE-2021-27364.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-27364&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Adam Nichols reported that the iSCSI initiator subsystem did not
properly restrict access to its netlink management interface.  On
a system acting as an iSCSI initiator, a local user could use
these to cause a denial of service (disconnection of storage) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-27365&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Adam Nichols reported that the iSCSI initiator subsystem did not
correctly limit the lengths of parameters or &amp;quot;passthrough PDUs&amp;quot;
sent through its netlink management interface.  On a system acting
as an iSCSI initiator, a local user could use these to leak the
contents of kernel memory, to cause a denial of service (kernel
memory corruption or crash), and probably for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-377-1 pygments security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-377-1-pygments/</link>
      <pubDate>Fri, 12 Mar 2021 11:11:24 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-377-1-pygments/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-377-1-pygments/">
      
&lt;p&gt;Package : pygments&lt;/p&gt;


&lt;p&gt;Version : 2.0.1&amp;#43;dfsg-1.1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20270&#34;&gt;CVE-2021-20270&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that pygments, a generic syntax highlighter, is vulnerable
to a CPU exhaustion attack via a crafted SML file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-376-1 libhibernate3-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-376-1-libhibernate3-java/</link>
      <pubDate>Mon, 08 Mar 2021 04:29:15 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-376-1-libhibernate3-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-376-1-libhibernate3-java/">
      
&lt;p&gt;Package : libhibernate3-java&lt;/p&gt;


&lt;p&gt;Version : 3.6.10.Final-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25638&#34;&gt;CVE-2020-25638&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in hibernate-core. A SQL injection in the implementation
of the JPA Criteria API can permit unsanitized literals when a literal is
used in the SQL comments of the query. This flaw could allow an attacker to
access unauthorized information or possibly conduct further attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-375-1 libcaca security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-375-1-libcaca/</link>
      <pubDate>Mon, 08 Mar 2021 00:56:16 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-375-1-libcaca/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-375-1-libcaca/">
      
&lt;p&gt;Package : libcaca&lt;/p&gt;


&lt;p&gt;Version : 0.99.beta19-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3410&#34;&gt;CVE-2021-3410&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow issue in caca_resize function in
libcaca/caca/canvas.c may lead to local execution of arbitrary code in
the user context.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-374-1 wpa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-374-1-wpa/</link>
      <pubDate>Wed, 03 Mar 2021 02:41:57 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-374-1-wpa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-374-1-wpa/">
      
&lt;p&gt;Package : wpa&lt;/p&gt;


&lt;p&gt;Version : 2.3-1&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27803&#34;&gt;CVE-2021-27803&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant
before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests.
It could result in denial of service or other impact (potentially
execution of arbitrary code), for an attacker within radio range.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-373-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-373-1-openjpeg2/</link>
      <pubDate>Mon, 01 Mar 2021 22:39:55 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-373-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-373-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-2&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27824&#34;&gt;CVE-2020-27824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27841&#34;&gt;CVE-2020-27841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27845&#34;&gt;CVE-2020-27845&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues were identified in openjpeg2.&lt;/p&gt;
&lt;p&gt;CVE-2020-27824: Global buffer overflow on irreversible conversion when too many decomposition levels are specified.&lt;/p&gt;
&lt;p&gt;CVE-2020-27841: Crafted input to be processed by the openjpeg encoder could cause an out-of-bounds read.&lt;/p&gt;
&lt;p&gt;CVE-2020-27845: Crafted input can cause out-of-bounds-read.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-372-1 screen security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-372-1-screen/</link>
      <pubDate>Fri, 26 Feb 2021 21:03:24 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-372-1-screen/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-372-1-screen/">
      
&lt;p&gt;Package : screen&lt;/p&gt;


&lt;p&gt;Version : 4.2.1-3&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26937&#34;&gt;CVE-2021-26937&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;encoding.c in GNU Screen through 4.8.0 allows remote attackers
to cause a denial of service (invalid write access and application
crash) or possibly have unspecified other impact via a crafted
UTF-8 character sequence.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;NOTE&lt;/strong&gt;: In order to bring this update to effect, you will
need to restart your screen session(s).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-371-1 openldap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-371-1-openldap/</link>
      <pubDate>Sun, 21 Feb 2021 15:15:59 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-371-1-openldap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-371-1-openldap/">
      
&lt;p&gt;Package : openldap&lt;/p&gt;


&lt;p&gt;Version : 2.4.40&amp;#43;dfsg-1&amp;#43;deb8u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27212&#34;&gt;CVE-2021-27212&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability in the Certificate List Exact Assertion validation
was discovered in OpenLDAP, a free implementation of the Lightweight
Directory Access Protocol. An unauthenticated remote attacker can
take advantage of this flaw to cause a denial of service (slapd
daemon crash) via specially crafted packets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-370-1 wpa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-370-1-wpa/</link>
      <pubDate>Sat, 20 Feb 2021 13:08:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-370-1-wpa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-370-1-wpa/">
      
&lt;p&gt;Package : wpa&lt;/p&gt;


&lt;p&gt;Version : 2.3-1&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0326&#34;&gt;CVE-2021-0326&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in wpa, a set of tools to support WPA and WPA2
(IEEE 802.11i).
Missing validation of data can result in a buffer over-write, which might
lead to a DoS of the wpa_supplicant process or potentially arbitrary code
execution.&lt;/p&gt;
&lt;p&gt;The mentioned support for WPA-EAP-SUITE-B(-192) in the changelog does
not affect the version in Jessie.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-369-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-369-1-bind9/</link>
      <pubDate>Fri, 19 Feb 2021 08:50:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-369-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-369-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8625&#34;&gt;CVE-2020-8625&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a buffer overflow attack in the &lt;code&gt;bind9&lt;/code&gt; DNS
server caused by an issue in the GSSAPI (&amp;ldquo;Generic Security Services&amp;rdquo;) security
policy negotiation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-368-1 unrar-free security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-368-1-unrar-free/</link>
      <pubDate>Thu, 18 Feb 2021 23:51:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-368-1-unrar-free/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-368-1-unrar-free/">
      
&lt;p&gt;Package : unrar-free&lt;/p&gt;


&lt;p&gt;Version : 1:0.0.1&amp;#43;cvs20140707-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14120&#34;&gt;CVE-2017-14120&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14121&#34;&gt;CVE-2017-14121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14122&#34;&gt;CVE-2017-14122&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in unrar-free, an unarchiver for .rar files.
CVE-2017-14120 is related to a directory traversal vulnerability for RAR v2 archives.
CVE-2017-14121 is related to NULL pointer dereference flaw triggered by a specially crafted RAR archive.
CVE-2017-14122 is related to stack-based buffer over-read.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-367-1 libbsd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-367-1-libbsd/</link>
      <pubDate>Thu, 18 Feb 2021 23:05:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-367-1-libbsd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-367-1-libbsd/">
      
&lt;p&gt;Package : libbsd&lt;/p&gt;


&lt;p&gt;Version : 0.7.0-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20367&#34;&gt;CVE-2019-20367&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libbsd, a library with utility functions from BSD systems.
A non-NUL terminated symbol name in the string table might result in an out-of-bounds read.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-366-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-366-1-openssl/</link>
      <pubDate>Thu, 18 Feb 2021 18:29:37 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-366-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-366-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23840&#34;&gt;CVE-2021-23840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-23841&#34;&gt;CVE-2021-23841&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two issues in the OpenSSL cryptographic
system:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Prevent an issue where &amp;ldquo;Digital EnVeloPe&amp;rdquo; EVP-related calls could cause
applications to behave incorrectly or even crash.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Prevent an issue in the X509 certificate parsing caused by the lack of
error handling while ingesting the &amp;ldquo;issuer&amp;rdquo; field.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-365-1 php-horde-text-filter security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-365-1-php-horde-text-filter/</link>
      <pubDate>Thu, 18 Feb 2021 15:02:44 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-365-1-php-horde-text-filter/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-365-1-php-horde-text-filter/">
      
&lt;p&gt;Package : php-horde-text-filter&lt;/p&gt;


&lt;p&gt;Version : 2.2.1-5&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-5303&#34;&gt;CVE-2016-5303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26929&#34;&gt;CVE-2021-26929&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Alex Birnberg discovered a cross-site scripting (XSS) vulnerability in
the Horde Application Framework, more precisely its Text Filter API.
An attacker could take control of a user&amp;rsquo;s mailbox by sending a
crafted e-mail. This update also fixes a separate minor XSS
vulnerability discovered by Liuzhu.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-26929&lt;/p&gt;
&lt;p&gt;An XSS issue was discovered in Horde Groupware Webmail Edition
(where the Horde_Text_Filter library is used). The attacker can
send a plain text e-mail message, with JavaScript encoded as a
link or email that is mishandled by preProcess in Text2html.php,
because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes
with XSS defenses.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2016-5303&lt;/p&gt;
&lt;p&gt;Cross-site scripting (XSS) vulnerability in the Horde Text Filter
API in Horde Groupware and Horde Groupware Webmail Edition allows
remote attackers to inject arbitrary web script or HTML via
crafted data:text/html content in a form (1) action or (2) xlink
attribute.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-364-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-364-1-qemu/</link>
      <pubDate>Tue, 16 Feb 2021 17:46:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-364-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-364-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11947&#34;&gt;CVE-2020-11947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15469&#34;&gt;CVE-2020-15469&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15859&#34;&gt;CVE-2020-15859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25084&#34;&gt;CVE-2020-25084&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29130&#34;&gt;CVE-2020-29130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29443&#34;&gt;CVE-2020-29443&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20181&#34;&gt;CVE-2021-20181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-20221&#34;&gt;CVE-2021-20221&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in QEMU, a fast processor
emulator (notably used in KVM and Xen HVM virtualization). An attacker
could trigger a denial-of-service (DoS), information leak, and
possibly execute arbitrary code with the privileges of the QEMU
process on the host.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-15469&lt;/p&gt;
&lt;p&gt;A MemoryRegionOps object may lack read/write callback methods,
leading to a NULL pointer dereference.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-15859&lt;/p&gt;
&lt;p&gt;QEMU has a use-after-free in hw/net/e1000e_core.c because a guest
OS user can trigger an e1000e packet with the data&amp;rsquo;s address set
to the e1000e&amp;rsquo;s MMIO address.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25084&lt;/p&gt;
&lt;p&gt;QEMU has a use-after-free in hw/usb/hcd-xhci.c because the
usb_packet_map return value is not checked.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-28916&lt;/p&gt;
&lt;p&gt;hw/net/e1000e_core.c has an infinite loop via an RX descriptor
with a NULL buffer address.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-29130&lt;/p&gt;
&lt;p&gt;slirp.c has a buffer over-read because it tries to read a certain
amount of header data even if that exceeds the total packet
length.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-29443&lt;/p&gt;
&lt;p&gt;ide_atapi_cmd_reply_end in hw/ide/atapi.c allows out-of-bounds
read access because a buffer index is not validated.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-20181&lt;/p&gt;
&lt;p&gt;9pfs: ZDI-CAN-10904: QEMU Plan 9 file system TOCTOU privilege
escalation vulnerability.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2021-20221&lt;/p&gt;
&lt;p&gt;aarch64: GIC: out-of-bound heap buffer access via an interrupt ID
field.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-363-1 xterm security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-363-1-xterm/</link>
      <pubDate>Sat, 13 Feb 2021 23:18:44 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-363-1-xterm/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-363-1-xterm/">
      
&lt;p&gt;Package : xterm&lt;/p&gt;


&lt;p&gt;Version : 312-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-27135&#34;&gt;CVE-2021-27135&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;xterm through Patch #365 allows remote attackers to cause a
denial of service (segmentation fault) or possibly have
unspecified other impact via a crafted UTF-8 character sequence.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-362-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-362-1-intel-microcode/</link>
      <pubDate>Sat, 13 Feb 2021 12:24:04 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-362-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-362-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20201118.1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8695&#34;&gt;CVE-2020-8695&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8696&#34;&gt;CVE-2020-8696&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8698&#34;&gt;CVE-2020-8698&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2020-8695&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Observable discrepancy in the RAPL interface for some
Intel(R) Processors may allow a privileged user to
potentially enable information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8696&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper removal of sensitive information before storage
or transfer in some Intel(R) Processors may allow an
authenticated user to potentially enable information
disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8698&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper isolation of shared resources in some
Intel(R) Processors may allow an authenticated user to
potentially enable information disclosure via local access.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-361-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-361-1-jasper/</link>
      <pubDate>Thu, 11 Feb 2021 01:43:00 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-361-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-361-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-debian1-2.4&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26926&#34;&gt;CVE-2021-26926&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-26927&#34;&gt;CVE-2021-26927&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2021-26926&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow vulnerability was discovered
in JasPer, through jp2_dec.c in the jp2_decode() function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-26927&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A null pointer access was discovered in JasPer, through
jp2_dec.c in the jp2_decode() function.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-360-1 gdisk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-360-1-gdisk/</link>
      <pubDate>Mon, 08 Feb 2021 13:47:44 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-360-1-gdisk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-360-1-gdisk/">
      
&lt;p&gt;Package : gdisk&lt;/p&gt;


&lt;p&gt;Version : 0.8.10-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-0256&#34;&gt;CVE-2020-0256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-0308&#34;&gt;CVE-2021-0308&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2020-0256&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In LoadPartitionTable of gpt.cc, there is a possible
out of bounds write due to a missing bounds check. This
could lead to local escalation of privilege with no
additional execution privileges needed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2021-0308&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In ReadLogicalParts of basicmbr.cc, there is a possible
out of bounds write due to a missing bounds check. This
could lead to local escalation of privilege with no
additional execution privileges needed.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-359-1 python-apt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-359-1-python-apt/</link>
      <pubDate>Sun, 07 Feb 2021 01:12:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-359-1-python-apt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-359-1-python-apt/">
      
&lt;p&gt;Package : python-apt&lt;/p&gt;


&lt;p&gt;Version : 0.9.3.14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27351&#34;&gt;CVE-2020-27351&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Various memory and file descriptor leaks were discovered in the Python
interface to the APT package management runtime library, which could
result in denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-358-1 openldap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-358-1-openldap/</link>
      <pubDate>Fri, 05 Feb 2021 20:56:36 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-358-1-openldap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-358-1-openldap/">
      
&lt;p&gt;Package : openldap&lt;/p&gt;


&lt;p&gt;Version : 2.4.40&amp;#43;dfsg-1&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36221&#34;&gt;CVE-2020-36221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36222&#34;&gt;CVE-2020-36222&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36223&#34;&gt;CVE-2020-36223&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36224&#34;&gt;CVE-2020-36224&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36225&#34;&gt;CVE-2020-36225&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36226&#34;&gt;CVE-2020-36226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36227&#34;&gt;CVE-2020-36227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36228&#34;&gt;CVE-2020-36228&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36229&#34;&gt;CVE-2020-36229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-36230&#34;&gt;CVE-2020-36230&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in OpenLDAP, a free
implementation of the Lightweight Directory Access Protocol. An
unauthenticated remote attacker can take advantage of these flaws to
cause a denial of service (slapd daemon crash, infinite loops) via
specially crafted packets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-357-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-357-1-jasper/</link>
      <pubDate>Wed, 03 Feb 2021 12:44:28 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-357-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-357-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-debian1-2.4&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3272&#34;&gt;CVE-2021-3272&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;&lt;code&gt;jp2_decode in jp2/jp2_dec.c&lt;/code&gt; in libjasper in JasPer has a heap-based
buffer over-read when there is an invalid relationship between the
number of channels and the number of image components.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-356-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-356-1-libdatetime-timezone-perl/</link>
      <pubDate>Tue, 02 Feb 2021 13:49:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-356-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-356-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2021a&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2021a for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-355-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-355-1-tzdata/</link>
      <pubDate>Tue, 02 Feb 2021 13:42:16 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-355-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-355-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2021a-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2021a. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;South Sudan changed from +03 to +02 on 2021-02-01.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-343-1 phpmyadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-343-1-phpmyadmin/</link>
      <pubDate>Tue, 02 Feb 2021 09:24:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-343-1-phpmyadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-343-1-phpmyadmin/">
      
&lt;p&gt;Package : phpmyadmin&lt;/p&gt;


&lt;p&gt;Version : 4:4.2.12-2&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2045&#34;&gt;CVE-2016-2045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-5097&#34;&gt;CVE-2016-5097&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-5702&#34;&gt;CVE-2016-5702&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-6623&#34;&gt;CVE-2016-6623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12922&#34;&gt;CVE-2019-12922&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were addressed in phpmyadmin, a popular MySQL
web administration tool.&lt;/p&gt;
&lt;p&gt;CVE-2016-2045&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vulnerability in the SQL editor: A remote authenticated attacker is able to
inject arbitrary web script or HTML via a SQL query that triggers JSON data
in a response.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-5097&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;phpMyAdmin places tokens in query strings and does not arrange for them to
be stripped before external navigation, which allows remote attackers to
obtain sensitive information by reading (1) HTTP requests or (2) server
logs.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-6623&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An authorized user can cause a denial-of-service (DoS) attack on a server
by passing large values to a loop.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-5702&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;phpMyAdmin, when the environment lacks a PHP_SELF value, allows remote
attackers to conduct cookie-attribute injection attacks via a crafted URI.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-12922&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CSRF vulnerability that allows an attacker to delete a server when using
the setup script. Note: The setup script is disabled by default.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-354-1 python-django security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-354-1-python-django/</link>
      <pubDate>Mon, 01 Feb 2021 18:41:46 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-354-1-python-django/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-354-1-python-django/">
      
&lt;p&gt;Package : python-django&lt;/p&gt;


&lt;p&gt;Version : 1.7.11-1&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3281&#34;&gt;CVE-2021-3281&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential directory-traversal in
&lt;a href=&#34;https://djangoproject.com&#34;&gt;Django&lt;/a&gt;, a popular Python-based web development
framework.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;django.utils.archive.extract()&lt;/code&gt; function, used by &lt;code&gt;startapp --template&lt;/code&gt;
and &lt;code&gt;startproject --template&lt;/code&gt;, allowed directory-traversal via an archive
with absolute paths or relative paths with dot (&lt;code&gt;.&lt;/code&gt;) segments.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-353-1 libsdl2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-353-1-libsdl2/</link>
      <pubDate>Sat, 30 Jan 2021 22:34:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-353-1-libsdl2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-353-1-libsdl2/">
      
&lt;p&gt;Package : libsdl2&lt;/p&gt;


&lt;p&gt;Version : 2.0.2&amp;#43;dfsg1-6&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13616&#34;&gt;CVE-2019-13616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14409&#34;&gt;CVE-2020-14409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14410&#34;&gt;CVE-2020-14410&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in libsdl2, a library for portable low
level access to a video framebuffer, audio output, mouse, and keyboard.
All issues are related to either buffer overflow, integer overflow or
heap-based buffer over-read, resulting in a DoS or remote code execution
by using a crafted BMP file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-352-1 dbus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-352-1-dbus/</link>
      <pubDate>Thu, 28 Jan 2021 10:40:23 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-352-1-dbus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-352-1-dbus/">
      
&lt;p&gt;Package : dbus&lt;/p&gt;


&lt;p&gt;Version : 1.8.22-0&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35512&#34;&gt;CVE-2020-35512&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in dbus, a simple interprocess messaging system.
On a system having multiple usernames sharing the same UID a use-after-free might
happen, that could result in a denial of service or undefined behaviour, possibly
including incorrect authorization decisions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-351-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-351-1-sudo/</link>
      <pubDate>Wed, 27 Jan 2021 11:26:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-351-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-351-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.10p3-1&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3156&#34;&gt;CVE-2021-3156&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Qualys Research Labs discovered a heap-based buffer overflow
vulnerability in sudo, a program designed to provide limited super user
privileges to specific users. Any local user (sudoers and non-sudoers)
can exploit this flaw for root privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-350-1 python-bottle security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-350-1-python-bottle/</link>
      <pubDate>Sun, 24 Jan 2021 22:48:41 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-350-1-python-bottle/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-350-1-python-bottle/">
      
&lt;p&gt;Package : python-bottle&lt;/p&gt;


&lt;p&gt;Version : 0.12.7-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28473&#34;&gt;CVE-2020-28473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The package src:python-bottle before 0.12.19 are vulnerable to
Web Cache Poisoning by using a vector called parameter cloaking.&lt;/p&gt;
&lt;p&gt;When the attacker can separate query parameters using a
semicolon (;), they can cause a difference in the interpretation
of the request between the proxy (running with default
configuration) and the server. This can result in malicious
requests being cached as completely safe ones, as the proxy would
usually not see the semicolon as a separator, and therefore would
not include it in a cache key of an unkeyed parameter.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-349-1 mutt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-349-1-mutt/</link>
      <pubDate>Thu, 21 Jan 2021 01:50:23 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-349-1-mutt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-349-1-mutt/">
      
&lt;p&gt;Package : mutt&lt;/p&gt;


&lt;p&gt;Version : 1.5.23-3&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2021-3181&#34;&gt;CVE-2021-3181&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;rfc822.c in Mutt through 2.0.4 allows remote attackers to
cause a denial of service (mailbox unavailability) by sending
email messages with sequences of semicolon characters in
RFC822 address fields (aka terminators of empty groups).&lt;/p&gt;
&lt;p&gt;A small email message from the attacker can cause large
memory consumption, and the victim may then be unable to
see email messages from other persons.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-348-1 gst-plugins-bad1.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-348-1-gst-plugins-bad1.0/</link>
      <pubDate>Tue, 19 Jan 2021 01:12:17 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-348-1-gst-plugins-bad1.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-348-1-gst-plugins-bad1.0/">
      
&lt;p&gt;Package : gst-plugins-bad1.0&lt;/p&gt;


&lt;p&gt;Version : 1.4.4-2.1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/TEMP-0000000-FAEBC0&#34;&gt;TEMP-0000000-FAEBC0&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Andrew Wesie discovered a buffer overflow in the H264 support of the
GStreamer multimedia framework, which could potentially result in the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-347-1 ruby-redcarpet security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-347-1-ruby-redcarpet/</link>
      <pubDate>Sat, 16 Jan 2021 18:17:22 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-347-1-ruby-redcarpet/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-347-1-ruby-redcarpet/">
      
&lt;p&gt;Package : ruby-redcarpet&lt;/p&gt;


&lt;p&gt;Version : 3.1.2-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26298&#34;&gt;CVE-2020-26298&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In Redcarpet before version 3.5.1, there is an injection
vulnerability which can enable a cross-site scripting attack.&lt;/p&gt;
&lt;p&gt;In affected versions, no HTML escaping was being performed when
processing quotes. This applies even when the &lt;code&gt;:escape_html&lt;/code&gt;
option was being used.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-346-1 wavpack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-346-1-wavpack/</link>
      <pubDate>Thu, 14 Jan 2021 23:52:19 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-346-1-wavpack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-346-1-wavpack/">
      
&lt;p&gt;Package : wavpack&lt;/p&gt;


&lt;p&gt;Version : 4.70.0-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10169&#34;&gt;CVE-2016-10169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19840&#34;&gt;CVE-2018-19840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1010319&#34;&gt;CVE-2019-1010319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35738&#34;&gt;CVE-2020-35738&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities in wavpack were found, like OOB read
(which could potentially lead to a DOS attack), unexpected
control flow, crashes, integer overflow, and segfaults.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-345-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-345-1-imagemagick/</link>
      <pubDate>Tue, 12 Jan 2021 18:23:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-345-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-345-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-19667&#34;&gt;CVE-2020-19667&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25665&#34;&gt;CVE-2020-25665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25674&#34;&gt;CVE-2020-25674&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27560&#34;&gt;CVE-2020-27560&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27750&#34;&gt;CVE-2020-27750&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27760&#34;&gt;CVE-2020-27760&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27763&#34;&gt;CVE-2020-27763&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27765&#34;&gt;CVE-2020-27765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27773&#34;&gt;CVE-2020-27773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-29599&#34;&gt;CVE-2020-29599&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found in ImageMagick, a suite of
image manipulation programs. An attacker could cause denial of service
and execution of arbitrary code when a crafted image file is
processed.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-19667&lt;/p&gt;
&lt;p&gt;Stack-based buffer overflow and unconditional jump in ReadXPMImage
in coders/xpm.c&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25665&lt;/p&gt;
&lt;p&gt;The PALM image coder at coders/palm.c makes an improper call to
AcquireQuantumMemory() in routine WritePALMImage() because it
needs to be offset by 256. This can cause a out-of-bounds read
later on in the routine. This could cause impact to reliability.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-25674&lt;/p&gt;
&lt;p&gt;WriteOnePNGImage() from coders/png.c (the PNG coder) has a for
loop with an improper exit condition that can allow an
out-of-bounds READ via heap-buffer-overflow. This occurs because
it is possible for the colormap to have less than 256 valid values
but the loop condition will loop 256 times, attempting to pass
invalid colormap data to the event logger.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-27560&lt;/p&gt;
&lt;p&gt;ImageMagick allows Division by Zero in OptimizeLayerFrames in
MagickCore/layer.c, which may cause a denial of service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-27750&lt;/p&gt;
&lt;p&gt;A flaw was found in MagickCore/colorspace-private.h and
MagickCore/quantum.h. An attacker who submits a crafted file that
is processedcould trigger undefined behavior in the form of values
outside the range of type &lt;code&gt;unsigned char&lt;/code&gt; and math division by
zero. This would most likely lead to an impact to application
availability, but could potentially cause other problems related
to undefined behavior.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-27760&lt;/p&gt;
&lt;p&gt;In &lt;code&gt;GammaImage()&lt;/code&gt; of /MagickCore/enhance.c, depending on the
&lt;code&gt;gamma&lt;/code&gt; value, it&amp;rsquo;s possible to trigger a divide-by-zero condition
when a crafted input file is processed by ImageMagick. This could
lead to an impact to application availability.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-27763&lt;/p&gt;
&lt;p&gt;A flaw was found in MagickCore/resize.c. An attacker who submits a
crafted file that is processed by ImageMagick could trigger
undefined behavior in the form of math division by zero. This
would most likely lead to an impact to application availability,
but could potentially cause other problems related to undefined
behavior.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-27765&lt;/p&gt;
&lt;p&gt;A flaw was found in MagickCore/segment.c. An attacker who submits
a crafted file that is processed by ImageMagick could trigger
undefined behavior in the form of math division by zero. This
would most likely lead to an impact to application availability,
but could potentially cause other problems related to undefined
behavior.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-27773&lt;/p&gt;
&lt;p&gt;A flaw was found in MagickCore/gem-private.h. An attacker who
submits a crafted file that is processed by ImageMagick could
trigger undefined behavior in the form of values outside the range
of type &lt;code&gt;unsigned char&lt;/code&gt; or division by zero. This would most
likely lead to an impact to application availability, but could
potentially cause other problems related to undefined behavior.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-29599&lt;/p&gt;
&lt;p&gt;ImageMagick mishandles the -authenticate option, which allows
setting a password for password-protected PDF files. The
user-controlled password was not properly escaped/sanitized and it
was therefore possible to inject additional shell commands via
coders/pdf.c.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-344-1 apt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-344-1-apt/</link>
      <pubDate>Mon, 11 Jan 2021 19:09:33 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-344-1-apt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-344-1-apt/">
      
&lt;p&gt;Package : apt&lt;/p&gt;


&lt;p&gt;Version : 1.0.9.8.7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27350&#34;&gt;CVE-2020-27350&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that missing input validation in the ar/tar
implementations of APT, the high level package manager, could cause
out-of-bounds reads or infinite loops, resulting in denial of service
when processing malformed deb files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-342-1 dovecot security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-342-1-dovecot/</link>
      <pubDate>Tue, 05 Jan 2021 17:03:57 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-342-1-dovecot/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-342-1-dovecot/">
      
&lt;p&gt;Package : dovecot&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.13-12~deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25275&#34;&gt;CVE-2020-25275&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in the Dovecot IMAP server where a malicious
sender could crash Dovecot repeatedly by sending messages with more than 10,000
MIME parts.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-336-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-336-1-libxstream-java/</link>
      <pubDate>Thu, 31 Dec 2020 19:51:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-336-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-336-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.11.1-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26258&#34;&gt;CVE-2020-26258&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26259&#34;&gt;CVE-2020-26259&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were discovered in XStream, a Java library to
serialize objects to XML and back again.&lt;/p&gt;
&lt;p&gt;CVE-2020-26258&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;XStream is vulnerable to a Server-Side Forgery Request which can be
activated when unmarshalling. The vulnerability may allow a remote attacker
to request data from internal resources that are not publicly available
only by manipulating the processed input stream.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-26259&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xstream is vulnerable to an Arbitrary File Deletion on the local host when
unmarshalling. The vulnerability may allow a remote attacker to delete
arbitrary known files on the host as long as the executing process has
sufficient rights only by manipulating the processed input stream.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-341-1 highlight.js security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-341-1-highlight.js/</link>
      <pubDate>Wed, 30 Dec 2020 17:29:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-341-1-highlight.js/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-341-1-highlight.js/">
      
&lt;p&gt;Package : highlight.js&lt;/p&gt;


&lt;p&gt;Version : 8.2&amp;#43;ds-4&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26237&#34;&gt;CVE-2020-26237&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in highlight.js, a JavaScript library for syntax highlighting.
If a website or application renders user provided data it might be affected by a Prototype Pollution. This might result in strange behavior or crashes of applications that do not correctly handle unknown properties.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-340-1 cairo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-340-1-cairo/</link>
      <pubDate>Wed, 30 Dec 2020 20:59:54 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-340-1-cairo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-340-1-cairo/">
      
&lt;p&gt;Package : cairo&lt;/p&gt;


&lt;p&gt;Version : 1.14.0-2.1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-35492&#34;&gt;CVE-2020-35492&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;LibreOffice slideshow aborts with stack smashing in cairo&amp;rsquo;s composite_boxes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-339-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-339-1-linux-4.9/</link>
      <pubDate>Wed, 30 Dec 2020 08:46:23 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-339-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-339-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.246-2~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-0427&#34;&gt;CVE-2020-0427&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8694&#34;&gt;CVE-2020-8694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14351&#34;&gt;CVE-2020-14351&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25645&#34;&gt;CVE-2020-25645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25656&#34;&gt;CVE-2020-25656&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25668&#34;&gt;CVE-2020-25668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25669&#34;&gt;CVE-2020-25669&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25704&#34;&gt;CVE-2020-25704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25705&#34;&gt;CVE-2020-25705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27673&#34;&gt;CVE-2020-27673&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27675&#34;&gt;CVE-2020-27675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28974&#34;&gt;CVE-2020-28974&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to the execution of arbitrary code, privilege escalation,
denial of service or information leaks.&lt;/p&gt;
&lt;p&gt;CVE-2020-0427&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Elena Petrova reported a bug in the pinctrl subsystem that can
lead to a use-after-free after a device is renamed.  The security
impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8694&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers discovered that the powercap subsystem
allowed all users to read CPU energy meters, by default.  On
systems using Intel CPUs, this provided a side channel that could
leak sensitive information between user processes, or from the
kernel to user processes.  The energy meters are now readable only
by root, by default.

This issue can be mitigated by running:

    chmod go-r /sys/devices/virtual/powercap/*/*/energy_uj

This needs to be repeated each time the system is booted with
an unfixed kernel version.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14351&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the performance events
subsystem, which could lead to a use-after-free.  A local user
permitted to access performance events could use this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.

Debian&#39;s kernel configuration does not allow unprivileged users to
access peformance events by default, which fully mitigates this
issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25645&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the interface driver for GENEVE
encapsulated traffic when combined with IPsec. If IPsec is
configured to encrypt traffic for the specific UDP port used by the
GENEVE tunnel, tunneled data isn&#39;t correctly routed over the
encrypted link and sent unencrypted instead.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25656&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yuan Ming and Bodong Zhao discovered a race condition in the
virtual terminal (vt) driver that could lead to a use-after-free.
A local user with the CAP_SYS_TTY_CONFIG capability could use this
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25668&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yuan Ming and Bodong Zhao discovered a race condition in the
virtual terminal (vt) driver that could lead to a use-after-free.
A local user with access to a virtual terminal, or with the
CAP_SYS_TTY_CONFIG capability, could use this to cause a denial of
service (crash or memory corruption) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25669&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Bodong Zhao discovered a bug in the Sun keyboard driver (sunkbd)
that could lead to a use-after-free.  On a system using this
driver, a local user could use this to cause a denial of service
(crash or memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25704&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;kiyin(尹亮) discovered a potential memory leak in the performance
events subsystem.  A local user permitted to access performance
events could use this to cause a denial of service (memory
exhaustion).

Debian&#39;s kernel configuration does not allow unprivileged users to
access peformance events by default, which fully mitigates this
issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25705&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Keyu Man reported that strict rate-limiting of ICMP packet
transmission provided a side-channel that could help networked
attackers to carry out packet spoofing.  In particular, this made
it practical for off-path networked attackers to &amp;quot;poison&amp;quot; DNS
caches with spoofed responses (&amp;quot;SAD DNS&amp;quot; attack).

This issue has been mitigated by randomising whether packets are
counted against the rate limit.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27673 / XSA-332&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Julien Grall from Arm discovered a bug in the Xen event handling
code.  Where Linux was used in a Xen dom0, unprivileged (domU)
guests could cause a denial of service (excessive CPU usage or
hang) in dom0.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-27675 / XSA-331&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jinoh Kang of Theori discovered a race condition in the Xen event
handling code.  Where Linux was used in a Xen dom0, unprivileged
(domU) guests could cause a denial of service (crash) in dom0.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-28974&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Yuan Ming discovered a bug in the virtual terminal (vt) driver
that could lead to an out-of-bounds read.  A local user with
access to a virtual terminal, or with the CAP_SYS_TTY_CONFIG
capability, could possibly use this to obtain sensitive
information from the kernel or to cause a denial of service
(crash).

The specific ioctl operation affected by this bug
(KD_FONT_OP_COPY) has been disabled, as it is not believed that
any programs depended on it.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-338-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-338-1-libdatetime-timezone-perl/</link>
      <pubDate>Tue, 29 Dec 2020 20:50:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-338-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-338-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2020e&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2020e for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-337-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-337-1-tzdata/</link>
      <pubDate>Tue, 29 Dec 2020 20:46:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-337-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-337-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2020e-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2020e. Notable
changes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Volgograd switched to Moscow time on 2020-12-27 at 02:00.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-335-1 flac security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-335-1-flac/</link>
      <pubDate>Tue, 22 Dec 2020 17:50:08 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-335-1-flac/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-335-1-flac/">
      
&lt;p&gt;Package : flac&lt;/p&gt;


&lt;p&gt;Version : 1.3.0-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-0499&#34;&gt;CVE-2020-0499&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In &lt;code&gt;FLAC__bitreader_read_rice_signed_block&lt;/code&gt; of &lt;code&gt;bitreader.c&lt;/code&gt;,
there is a possible out-of-bounds read due to a heap buffer
overflow.&lt;/p&gt;
&lt;p&gt;This could lead to remote information disclosure with no
additional execution privileges needed. However, user
interaction is needed for exploitation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-300-2 openjdk-8 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-300-2-openjdk-8/</link>
      <pubDate>Tue, 22 Dec 2020 09:54:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-300-2-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-300-2-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u275-b01-1~deb8u1&lt;/p&gt;


      &lt;p&gt;A few issues have been found in the OpenJDK 8u272 update, including
LDAP connection failures and application crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-334-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-334-1-curl/</link>
      <pubDate>Fri, 18 Dec 2020 09:07:18 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-334-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-334-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8284&#34;&gt;CVE-2020-8284&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8285&#34;&gt;CVE-2020-8285&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in curl, a command line tool for
transferring data with URL syntax and an easy-to-use client-side URL
transfer library.&lt;/p&gt;
&lt;p&gt;CVE-2020-8284&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When curl performs a passive FTP transfer, it first tries the EPSV
command and if that is not supported, it falls back to using PASV.
Passive mode is what curl uses by default.  A server response to a
PASV command includes the (IPv4) address and port number for the
client to connect back to in order to perform the actual data
transfer.  This is how the FTP protocol is designed to work.  A
malicious server can use the PASV response to trick curl into
connecting back to a given IP address and port, and this way
potentially make curl extract information about services that are
otherwise private and not disclosed, for example doing port scanning
and service banner extractions.

The IP address part of the response is now ignored by default, by
making CURLOPT_FTP_SKIP_PASV_IP default to 1L instead of previously
being 0L.  This has the minor drawback that a small fraction of use
cases might break, when a server truly needs the client to connect
back to a different IP address than what the control connection uses
and for those CURLOPT_FTP_SKIP_PASV_IP can be set to 0L.  The same
goes for the command line tool, which then might need
--no-ftp-skip-pasv-ip set to prevent curl from ignoring the address
in the server response.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8285&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;libcurl offers a wildcard matching functionality, which allows a
callback (set with CURLOPT_CHUNK_BGN_FUNCTION) to return information
back to libcurl on how to handle a specific entry in a directory
when libcurl iterates over a list of all available entries.  When
this callback returns CURL_CHUNK_BGN_FUNC_SKIP, to tell libcurl to
not deal with that file, the internal function in libcurl then calls
itself recursively to handle the next directory entry.  If there&#39;s a
sufficient amount of file entries and if the callback returns &amp;quot;skip&amp;quot;
enough number of times, libcurl runs out of stack space.  The exact
amount will of course vary with platforms, compilers and other
environmental factors.  The content of the remote directory is not
kept on the stack, so it seems hard for the attacker to control
exactly what data that overwrites the stack - however it remains a
Denial-Of-Service vector as a malicious user who controls a server
that a libcurl-using application works with under these premises can
trigger a crash.

The internal function is rewritten to instead and more appropriately
use an ordinary loop instead of the recursive approach. This way,
the stack use will remain the same no matter how many files that are
skipped.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-333-1 openexr security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-333-1-openexr/</link>
      <pubDate>Tue, 15 Dec 2020 12:48:11 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-333-1-openexr/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-333-1-openexr/">
      
&lt;p&gt;Package : openexr&lt;/p&gt;


&lt;p&gt;Version : 1.6.1-8&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11764&#34;&gt;CVE-2020-11764&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15304&#34;&gt;CVE-2020-15304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16588&#34;&gt;CVE-2020-16588&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Three issues were discovered in &lt;code&gt;openexr&lt;/code&gt;, a set of tools to manipulate
&lt;a href=&#34;https://en.wikipedia.org/wiki/OpenEXR&#34;&gt;OpenEXR image files&lt;/a&gt;, often in the
computer-graphics industry for visual effects and animation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-332-1 lxml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-332-1-lxml/</link>
      <pubDate>Tue, 15 Dec 2020 11:04:38 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-332-1-lxml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-332-1-lxml/">
      
&lt;p&gt;Package : lxml&lt;/p&gt;


&lt;p&gt;Version : 3.4.0-1&amp;#43;deb8u3&lt;/p&gt;


      &lt;p&gt;It was discovered that the &lt;code&gt;clean_html()&lt;/code&gt; function of lxml, a Python library
for HTML and XML processing, performed insufficient sanitisation for embedded
Javascript code. This could lead to cross-site scripting or possibly the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-331-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-331-1-openssl/</link>
      <pubDate>Mon, 14 Dec 2020 10:08:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-331-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-331-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-0734&#34;&gt;CVE-2018-0734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1971&#34;&gt;CVE-2020-1971&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were found in OpenSSL, the Secure Sockets
Layer toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2018-0734&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A minor timing side channel attack was found in the OpenSSL DSA
signature algorithm. The fix for that introduced a more severe
regression that could also be exploited as a timing side channel
attack. This update fixes both the original problem and the
subsequent issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-1971&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;David Benjamin discovered a flaw in the GENERAL_NAME_cmp() function
which could cause a NULL dereference, resulting in denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-329-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-329-1-jasper/</link>
      <pubDate>Fri, 11 Dec 2020 23:07:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-329-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-329-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-debian1-2.4&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9782&#34;&gt;CVE-2017-9782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19139&#34;&gt;CVE-2018-19139&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19543&#34;&gt;CVE-2018-19543&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27828&#34;&gt;CVE-2020-27828&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found and corrected in jasper, a JPEG
2000 image library, which could lead to denial-of-service or have other unspecified
impact.&lt;/p&gt;
&lt;p&gt;CVE-2018-19139: Fix memory leaks by registering jpc_unk_destroyparms.&lt;/p&gt;
&lt;p&gt;CVE-2020-27828: Avoid maxrlvls more than upper bound to cause heap-buffer-overflow.&lt;/p&gt;
&lt;p&gt;CVE-2018-19543 and CVE-2017-9782: There is a heap-based buffer over-read of size 8
in the function jp2_decode in libjasper/jp2/jp2_dec.c.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-330-1 xerces-c security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-330-1-xerces-c/</link>
      <pubDate>Fri, 11 Dec 2020 19:37:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-330-1-xerces-c/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-330-1-xerces-c/">
      
&lt;p&gt;Package : xerces-c&lt;/p&gt;


&lt;p&gt;Version : 3.1.1-5.1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1311&#34;&gt;CVE-2018-1311&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The UK&amp;rsquo;s National Cyber Security Centre (NCSC) discovered that
Xerces-C, a validating XML parser library for C++, contains a
use-after-free error triggered during the scanning of external
DTDs. An attacker could cause a Denial of Service (DoS) and possibly
achieve remote code execution. This flaw has not been addressed in the
maintained version of the library and has no complete mitigation. The
first is provided by this update which fixes the use-after-free
vulnerability at the expense of a memory leak. The other is to disable
DTD processing, which can be accomplished via the DOM using a standard
parser feature, or via SAX using the XERCES_DISABLE_DTD environment
variable.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-328-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-328-1-xorg-server/</link>
      <pubDate>Wed, 09 Dec 2020 11:30:06 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-328-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-328-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14360&#34;&gt;CVE-2020-14360&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25712&#34;&gt;CVE-2020-25712&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan-Niklas Sohn discovered that the XKB extension of the Xorg X server
performed incomplete input validation, which could result in privilege
escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-327-1 openldap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-327-1-openldap/</link>
      <pubDate>Fri, 04 Dec 2020 21:17:32 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-327-1-openldap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-327-1-openldap/">
      
&lt;p&gt;Package : openldap&lt;/p&gt;


&lt;p&gt;Version : 2.4.40&amp;#43;dfsg-1&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25709&#34;&gt;CVE-2020-25709&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25710&#34;&gt;CVE-2020-25710&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities in the certificate list syntax verification and
in the handling of CSN normalization were discovered in OpenLDAP, a
free implementation of the Lightweight Directory Access Protocol.
An unauthenticated remote attacker can take advantage of these
flaws to cause a denial of service (slapd daemon crash) via
specially crafted packets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-326-1 libxstream-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-326-1-libxstream-java/</link>
      <pubDate>Wed, 02 Dec 2020 00:37:56 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-326-1-libxstream-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-326-1-libxstream-java/">
      
&lt;p&gt;Package : libxstream-java&lt;/p&gt;


&lt;p&gt;Version : 1.4.7-2&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26217&#34;&gt;CVE-2020-26217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that XStream is vulnerable to Remote Code Execution. The
vulnerability may allow a remote attacker to run arbitrary shell commands only
by manipulating the processed input stream. Users who rely on blocklists
are affected (the default in Debian). We strongly recommend to use the
whitelist approach of XStream&amp;rsquo;s Security Framework because there are likely
more class combinations the blacklist approach may not address.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-323-1 lxml security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-323-1-lxml/</link>
      <pubDate>Tue, 01 Dec 2020 09:09:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-323-1-lxml/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-323-1-lxml/">
      
&lt;p&gt;Package : lxml&lt;/p&gt;


&lt;p&gt;Version : 3.4.0-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19787&#34;&gt;CVE-2018-19787&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27783&#34;&gt;CVE-2020-27783&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the &lt;code&gt;clean_html()&lt;/code&gt; function of lxml, a Python library
for HTML and XML processing, performed insufficient sanitisation for embedded
Javascript code. This could lead to cross-site scripting or possibly the
execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-325-1 mutt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-325-1-mutt/</link>
      <pubDate>Tue, 01 Dec 2020 03:55:30 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-325-1-mutt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-325-1-mutt/">
      
&lt;p&gt;Package : mutt&lt;/p&gt;


&lt;p&gt;Version : 1.5.23-3&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28896&#34;&gt;CVE-2020-28896&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In Mutt, a text-based Mail User Agent, invalid IMAP server responses
were not properly handled, potentially resulting in authentication
credentials being exposed or man-in-the-middle attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-324-1 musl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-324-1-musl/</link>
      <pubDate>Tue, 01 Dec 2020 03:47:18 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-324-1-musl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-324-1-musl/">
      
&lt;p&gt;Package : musl&lt;/p&gt;


&lt;p&gt;Version : 1.1.5-2&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28928&#34;&gt;CVE-2020-28928&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The wcsnrtombs function in all musl libc versions up through 1.2.1 has
been found to have multiple bugs in handling of destination buffer
size when limiting the input character count, which can lead to
infinite loop with no forward progress (no overflow) or writing past
the end of the destination buffers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-322-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-322-1-libdatetime-timezone-perl/</link>
      <pubDate>Mon, 30 Nov 2020 20:25:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-322-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-322-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2020d&lt;/p&gt;


      &lt;p&gt;This update includes the changes in tzdata 2020d for the
Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-321-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-321-1-qemu/</link>
      <pubDate>Sun, 29 Nov 2020 23:12:56 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-321-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-321-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25085&#34;&gt;CVE-2020-25085&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25624&#34;&gt;CVE-2020-25624&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25625&#34;&gt;CVE-2020-25625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25723&#34;&gt;CVE-2020-25723&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27617&#34;&gt;CVE-2020-27617&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Some issues have been found in qemu, a fast processor emulator.&lt;/p&gt;
&lt;p&gt;All issues are related to assertion failures, out-of-bounds access failures or bad handling of return codes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-320-1 tcpflow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-320-1-tcpflow/</link>
      <pubDate>Sun, 29 Nov 2020 00:05:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-320-1-tcpflow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-320-1-tcpflow/">
      
&lt;p&gt;Package : tcpflow&lt;/p&gt;


&lt;p&gt;Version : 1.4.4&amp;#43;repack1-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14938&#34;&gt;CVE-2018-14938&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in tcpflow, a TCP flow recorder.&lt;/p&gt;
&lt;p&gt;Due to an overflow vulnerability in function handle_80211, an out-of-bounds read with access to sensitive memory or a denial of service might happen.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-319-1 libass security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-319-1-libass/</link>
      <pubDate>Sun, 29 Nov 2020 00:02:11 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-319-1-libass/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-319-1-libass/">
      
&lt;p&gt;Package : libass&lt;/p&gt;


&lt;p&gt;Version : 0.10.2-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-7969&#34;&gt;CVE-2016-7969&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-7972&#34;&gt;CVE-2016-7972&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in libass, a library for SSA/ASS subtitles rendering.&lt;/p&gt;
&lt;p&gt;CVE-2016-7972:
Fix memory reallocation in the shaper.&lt;/p&gt;
&lt;p&gt;CVE-2016-7969:
Fix mode 0/3 line wrapping equalization in specific cases which could
result in illegal reads while laying out and shaping text.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-318-1 python-werkzeug security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-318-1-python-werkzeug/</link>
      <pubDate>Tue, 24 Nov 2020 12:47:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-318-1-python-werkzeug/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-318-1-python-werkzeug/">
      
&lt;p&gt;Package : python-werkzeug&lt;/p&gt;


&lt;p&gt;Version : 0.9.6&amp;#43;dfsg-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28724&#34;&gt;CVE-2020-28724&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that the WSGI server included in Werkzeug would redirect requests
if the URL path started with a double slash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-317-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-317-1-samba/</link>
      <pubDate>Sun, 22 Nov 2020 22:08:25 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-317-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-317-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:4.2.14&amp;#43;dfsg-0&amp;#43;deb8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1472&#34;&gt;CVE-2020-1472&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10704&#34;&gt;CVE-2020-10704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10745&#34;&gt;CVE-2020-10745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14303&#34;&gt;CVE-2020-14303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14318&#34;&gt;CVE-2020-14318&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14323&#34;&gt;CVE-2020-14323&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14383&#34;&gt;CVE-2020-14383&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix.&lt;/p&gt;
&lt;p&gt;CVE-2020-1472&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unauthenticated domain controller compromise by subverting Netlogon
cryptography.  This vulnerability includes both ZeroLogon and
non-ZeroLogon variations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10704&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An unauthorized user can trigger a denial of service via a stack
overflow in the AD DC LDAP server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10745&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Denial of service resulting from abuse of compression of replies to
NetBIOS over TCP/IP name resolution and DNS packets causing excessive
CPU load on the Samba AD DC.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14303&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Denial of service resulting from CPU spin and and inability to
process further requests once the AD DC NBT server receives an empty
(zero-length) UDP packet to port 137.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14318&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Missing handle permissions check in ChangeNotify
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14323&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unprivileged user can crash winbind via invalid lookupsids DoS
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14383&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;DNS server crash via invalid records resulting from uninitialized
variables
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-316-1 zsh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-316-1-zsh/</link>
      <pubDate>Thu, 19 Nov 2020 16:21:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-316-1-zsh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-316-1-zsh/">
      
&lt;p&gt;Package : zsh&lt;/p&gt;


&lt;p&gt;Version : 5.0.7-5&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10714&#34;&gt;CVE-2016-10714&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18206&#34;&gt;CVE-2017-18206&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-0502&#34;&gt;CVE-2018-0502&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1071&#34;&gt;CVE-2018-1071&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1083&#34;&gt;CVE-2018-1083&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1100&#34;&gt;CVE-2018-1100&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13259&#34;&gt;CVE-2018-13259&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found and corrected in zsh, a powerful
shell and scripting language. Off-by-one errors, wrong parsing of shebang lines
and buffer overflows may lead to unexpected behavior. A local, unprivileged
user can create a specially crafted message file or directory path. If the
receiving user is privileged or traverses the aforementioned path, this leads
to privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-315-1 phpmyadmin security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-315-1-phpmyadmin/</link>
      <pubDate>Thu, 19 Nov 2020 13:17:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-315-1-phpmyadmin/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-315-1-phpmyadmin/">
      
&lt;p&gt;Package : phpmyadmin&lt;/p&gt;


&lt;p&gt;Version : 4:4.2.12-2&amp;#43;deb8u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-6606&#34;&gt;CVE-2016-6606&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26934&#34;&gt;CVE-2020-26934&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26935&#34;&gt;CVE-2020-26935&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been fixed in phpMyAdmin, the web-based MySQL administration interface.&lt;/p&gt;
&lt;p&gt;CVE-2016-6606&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Two issues were found affecting the way cookies are stored.

The decryption of the username/password is vulnerable to a padding oracle attack.
This can allow an attacker who has access to a user&#39;s browser cookie file to
decrypt the username and password.

A vulnerability was found where the same initialization vector is used to hash
the username and password stored in the phpMyAdmin cookie. If a user has the
same password as their username, an attacker who examines the browser cookie
can see that they are the same, but the attacker can not directly decode these
values from the cookie as it is still hashed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-26934&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A vulnerability was discovered where an attacker can cause an XSS
attack through the transformation feature.

If an attacker sends a crafted link to the victim with the malicious
JavaScript, when the victim clicks on the link, the JavaScript will run
and complete the instructions made by the attacker.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-26935&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An SQL injection vulnerability was discovered in how phpMyAdmin
processes SQL statements in the search feature. An attacker could use
this flaw to inject malicious SQL in to a query.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-314-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-314-1-openjdk-7/</link>
      <pubDate>Wed, 11 Nov 2020 13:14:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-314-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-314-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u281-2.6.24-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14779&#34;&gt;CVE-2020-14779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14781&#34;&gt;CVE-2020-14781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14782&#34;&gt;CVE-2020-14782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14792&#34;&gt;CVE-2020-14792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14796&#34;&gt;CVE-2020-14796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14797&#34;&gt;CVE-2020-14797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14798&#34;&gt;CVE-2020-14798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14803&#34;&gt;CVE-2020-14803&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in denial of service, bypass of sandbox restrictions or
information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-313-1 zeromq3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-313-1-zeromq3/</link>
      <pubDate>Tue, 10 Nov 2020 19:15:39 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-313-1-zeromq3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-313-1-zeromq3/">
      
&lt;p&gt;Package : zeromq3&lt;/p&gt;


&lt;p&gt;Version : 4.0.5&amp;#43;dfsg-2&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15166&#34;&gt;CVE-2020-15166&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that ZeroMQ, a lightweight messaging kernel library
does not properly handle connecting peers before a handshake is
completed. A remote, unauthenticated client connecting to an application
using the libzmq library, running with a socket listening with CURVE
encryption/authentication enabled can take advantage of this flaw to
cause a denial of service affecting authenticated and encrypted clients.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-312-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-312-1-tzdata/</link>
      <pubDate>Mon, 09 Nov 2020 19:14:06 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-312-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-312-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2020d-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;This update brings the timezone changes from the upstream 2020d release.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Revised predictions for Morocco&amp;rsquo;s changes starting in 2023.&lt;/li&gt;
&lt;li&gt;Macquarie Island has stayed in sync with Tasmania since 2011.&lt;/li&gt;
&lt;li&gt;Casey, Antarctica is at +08 in winter and +11 in summer since 2018.&lt;/li&gt;
&lt;li&gt;Palestine ends DST earlier than predicted, on 2020-10-24.&lt;/li&gt;
&lt;li&gt;Fiji starts DST later than usual, on 2020-12-20.&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-311-1 tcpdump security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-311-1-tcpdump/</link>
      <pubDate>Mon, 09 Nov 2020 15:36:30 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-311-1-tcpdump/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-311-1-tcpdump/">
      
&lt;p&gt;Package : tcpdump&lt;/p&gt;


&lt;p&gt;Version : 4.9.3-1~deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8037&#34;&gt;CVE-2020-8037&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The ppp de-capsulator in tcpdump 4.9.3 can be convinced to allocate
a large amount of memory.&lt;/p&gt;
&lt;p&gt;The buffer should be big enough to hold the captured data, but it
doesn&amp;rsquo;t need to be big enough to hold the entire on-the-network packet,
if we haven&amp;rsquo;t captured all of it.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-310-1 libexif security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-310-1-libexif/</link>
      <pubDate>Sat, 07 Nov 2020 19:07:39 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-310-1-libexif/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-310-1-libexif/">
      
&lt;p&gt;Package : libexif&lt;/p&gt;


&lt;p&gt;Version : 0.6.21-2&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-0452&#34;&gt;CVE-2020-0452&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In libexif/exif-entry.c, through libexif 0.6.21-2+deb8u4, compiler
optimization could remove a buffer overflow check, making a
buffer overflow possible with some EXIF tags.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-309-1 raptor2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-309-1-raptor2/</link>
      <pubDate>Sat, 07 Nov 2020 13:03:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-309-1-raptor2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-309-1-raptor2/">
      
&lt;p&gt;Package : raptor2&lt;/p&gt;


&lt;p&gt;Version : 2.0.14-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18926&#34;&gt;CVE-2017-18926&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there were two heap overflow vulnerabilities in
&lt;code&gt;raptor2&lt;/code&gt;, a set of parsers for RDF files that is used (amongst others) in
LibreOffice.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-308-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-308-1-krb5/</link>
      <pubDate>Sat, 07 Nov 2020 12:42:26 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-308-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-308-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;dfsg-19&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-28196&#34;&gt;CVE-2020-28196&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a denial of service vulnerability in the MIT
Kerberos network authentication system, &lt;code&gt;krb5&lt;/code&gt;. The lack of a limit in the
&amp;ldquo;ASN.1&amp;rdquo; decoder could lead to infinite recursion and allow an attacker to
overrun the stack and cause the process to crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-307-1 linux-4.9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-307-1-linux-4.9/</link>
      <pubDate>Tue, 03 Nov 2020 10:25:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-307-1-linux-4.9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-307-1-linux-4.9/">
      
&lt;p&gt;Package : linux-4.9&lt;/p&gt;


&lt;p&gt;Version : 4.9.240-2~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9445&#34;&gt;CVE-2019-9445&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19073&#34;&gt;CVE-2019-19073&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19074&#34;&gt;CVE-2019-19074&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19448&#34;&gt;CVE-2019-19448&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12351&#34;&gt;CVE-2020-12351&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12352&#34;&gt;CVE-2020-12352&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12655&#34;&gt;CVE-2020-12655&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12771&#34;&gt;CVE-2020-12771&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12888&#34;&gt;CVE-2020-12888&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14305&#34;&gt;CVE-2020-14305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14314&#34;&gt;CVE-2020-14314&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14331&#34;&gt;CVE-2020-14331&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14356&#34;&gt;CVE-2020-14356&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14386&#34;&gt;CVE-2020-14386&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14390&#34;&gt;CVE-2020-14390&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15393&#34;&gt;CVE-2020-15393&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16166&#34;&gt;CVE-2020-16166&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24490&#34;&gt;CVE-2020-24490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25211&#34;&gt;CVE-2020-25211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25212&#34;&gt;CVE-2020-25212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25220&#34;&gt;CVE-2020-25220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25284&#34;&gt;CVE-2020-25284&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25285&#34;&gt;CVE-2020-25285&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25641&#34;&gt;CVE-2020-25641&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25643&#34;&gt;CVE-2020-25643&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26088&#34;&gt;CVE-2020-26088&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to the execution of arbitrary code, privilege escalation,
denial of service or information leaks.&lt;/p&gt;
&lt;p&gt;CVE-2019-9445&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential out-of-bounds read was discovered in the F2FS
implementation.  A user permitted to mount and access arbitrary
filesystems could potentially use this to cause a denial of
service (crash) or to read sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19073, CVE-2019-19074&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Navid Emamdoost discovered potential memory leaks in the ath9k and
ath9k_htc drivers.  The security impact of these is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19448&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;quot;Team bobfuzzer&amp;quot; reported a bug in Btrfs that could lead to a
use-after-free, and could be triggered by crafted filesystem
images.  A user permitted to mount and access arbitrary
filesystems could use this to cause a denial of service (crash or
memory corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12351&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andy Nguyen discovered a flaw in the Bluetooth implementation in
the way L2CAP packets with A2MP CID are handled.  A remote attacker
within a short distance, knowing the victim&#39;s Bluetooth device
address, can send a malicious l2cap packet and cause a denial of
service or possibly arbitrary code execution with kernel
privileges.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12352&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andy Nguyen discovered a flaw in the Bluetooth implementation.
Stack memory is not properly initialised when handling certain AMP
packets.  A remote attacker within a short distance, knowing the
victim&#39;s Bluetooth device address address, can retrieve kernel
stack information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12655&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zheng Bin reported that crafted XFS volumes could trigger a system
hang.  An attacker able to mount such a volume could use this to
cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12771&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Zhiqiang Liu reported a bug in the bcache block driver that could
lead to a system hang.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12888&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the PCIe Virtual Function I/O (vfio-pci)
driver allowed users to disable a device&#39;s memory space while it
was still mapped into a process.  On some hardware platforms,
local users or guest virtual machines permitted to access PCIe
Virtual Functions could use this to cause a denial of service
(hardware error and crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14305&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vasily Averin of Virtuozzo discovered a potential heap buffer
overflow in the netfilter nf_contrack_h323 module.  When this
module is used to perform connection tracking for TCP/IPv6, a
remote attacker could use this to cause a denial of service (crash
or memory corruption) or possibly for remote code execution with
kernel privilege.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14314&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A bug was discovered in the ext4 filesystem that could lead to an
out-of-bound read.  A local user permitted to mount and access
arbitrary filesystem images could use this to cause a denial of
service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14331&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A bug was discovered in the VGA console driver&#39;s soft-scrollback
feature that could lead to a heap buffer overflow.  On a system
with a custom kernel that has CONFIG_VGACON_SOFT_SCROLLBACK
enabled, a local user with access to a console could use this to
cause a denial of service (crash or memory corruption) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14356, CVE-2020-25220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A bug was discovered in the cgroup subsystem&#39;s handling of socket
references to cgroups.  In some cgroup configurations, this could
lead to a use-after-free.  A local user might be able to use this
to cause a denial of service (crash or memory corruption) or
possibly for privilege escalation.

The original fix for this bug introudced a new security issue,
which is also addressed in this update.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14386&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Or Cohen discovered a bug in the packet socket (AF_PACKET)
implementation which could lead to a heap buffer overflow.  A
local user with the CAP_NET_RAW capability (in any user namespace)
could use this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14390&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Minh Yuan discovered a bug in the framebuffer console driver&#39;s
scrollback feature that could lead to a heap buffer overflow.  On
a system using framebuffer consoles, a local user with access to a
console could use this to cause a denial of service (crash or
memory corruption) or possibly for privilege escalation.

The scrollback feature has been disabled for now, as no other fix
was available for this issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-15393&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyungtae Kim reported a memory leak in the usbtest driver.  The
security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-16166&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Amit Klein reported that the random number generator used by the
network stack might not be re-seeded for long periods of time,
making e.g. client port number allocations more predictable.  This
made it easier for remote attackers to carry out some network-
based attacks such as DNS cache poisoning or device tracking.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24490&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andy Nguyen discovered a flaw in the Bluetooth implementation that
can lead to a heap buffer overflow.  On systems with a Bluetooth 5
hardware interface, a remote attacker within a short distance can
use this to cause a denial of service (crash or memory corruption)
or possibly for remote code execution with kernel privilege.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25211&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in netfilter subsystem.  A local attacker
able to inject conntrack Netlink configuration can cause a denial
of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25212&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A bug was discovered in the NFSv4 client implementation that could
lead to a heap buffer overflow.  A malicious NFS server could use
this to cause a denial of service (crash or memory corruption) or
possibly to execute arbitrary code on the client.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25284&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Rados block device (rbd) driver allowed
tasks running as uid 0 to add and remove rbd devices, even if they
dropped capabilities.  On a system with the rbd driver loaded,
this might allow privilege escalation from a container with a task
running as root.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25285&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the hugetlb filesystem&#39;s sysctl
handlers, that could lead to stack corruption.  A local user
permitted to write to hugepages sysctls could use this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.  By default only the root user can do this.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25641&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a bug in the block layer that could lead to
an infinite loop.  A local user with access to a raw block device
could use this to cause a denial of service (unbounded CPU use and
possible system hang).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-25643&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ChenNan Of Chaitin Security Research Lab discovered a flaw in the
hdlc_ppp module.  Improper input validation in the ppp_cp_parse_cr()
function may lead to memory corruption and information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-26088&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the NFC (Near Field Communication) socket
implementation allowed any user to create raw sockets.  On a
system with an NFC interface, this allowed local users to evade
local network security policy.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-306-1 openldap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-306-1-openldap/</link>
      <pubDate>Tue, 03 Nov 2020 11:42:28 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-306-1-openldap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-306-1-openldap/">
      
&lt;p&gt;Package : openldap&lt;/p&gt;


&lt;p&gt;Version : 2.4.40&amp;#43;dfsg-1&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25692&#34;&gt;CVE-2020-25692&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability in the handling of normalization with modrdn was
discovered in OpenLDAP, a free implementation of the Lightweight
Directory Access Protocol. An unauthenticated remote attacker can
use this flaw to cause a denial of service (slapd daemon crash)
via a specially crafted packet.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-305-1 libsndfile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-305-1-libsndfile/</link>
      <pubDate>Thu, 29 Oct 2020 17:05:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-305-1-libsndfile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-305-1-libsndfile/">
      
&lt;p&gt;Package : libsndfile&lt;/p&gt;


&lt;p&gt;Version : 1.0.25-9.1&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-6892&#34;&gt;CVE-2017-6892&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7585&#34;&gt;CVE-2017-7585&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7586&#34;&gt;CVE-2017-7586&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7741&#34;&gt;CVE-2017-7741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7742&#34;&gt;CVE-2017-7742&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12562&#34;&gt;CVE-2017-12562&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16942&#34;&gt;CVE-2017-16942&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in libsndfile, a library for
reading/writing audio files.
All issues are basically divide by zero errors, heap read overflows or
other buffer overlow errors.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-303-1 junit4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-303-1-junit4/</link>
      <pubDate>Thu, 29 Oct 2020 14:01:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-303-1-junit4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-303-1-junit4/">
      
&lt;p&gt;Package : junit4&lt;/p&gt;


&lt;p&gt;Version : 4.11-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15250&#34;&gt;CVE-2020-15250&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The test rule TemporaryFolder contains a local information disclosure
vulnerability. On Unix like systems, the system&amp;rsquo;s temporary directory is shared
between all users on that system. Because of this, when files and directories
are written into this directory they are, by default, readable by other users
on that same system. This vulnerability does not allow other users to overwrite
the contents of these directories or files. This is purely an information
disclosure vulnerability. This vulnerability impacts you if the JUnit tests
write sensitive information, like API keys or passwords, into the temporary
folder, and the JUnit tests execute in an environment where the OS has other
untrusted users.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-289-2 python3.4 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-289-2-python3.4/</link>
      <pubDate>Tue, 27 Oct 2020 22:56:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-289-2-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-289-2-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u10&lt;/p&gt;


      &lt;p&gt;In contrast to packages built for architectures amd64 and i386, which
are built by sbuild in native mode, the packages for architecture armel
are built in cross build mode.
The changes for version 3.4.2-1+deb8u9 did not consider this and only
the packages for amd64 and i386 could be successfully created, whereas
the build of the armel version failed.
This has been fixed with the current upload, which builds for every
architecture now.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-304-1 freetype security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-304-1-freetype/</link>
      <pubDate>Mon, 26 Oct 2020 16:21:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-304-1-freetype/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-304-1-freetype/">
      
&lt;p&gt;Package : freetype&lt;/p&gt;


&lt;p&gt;Version : 2.5.2-3&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15999&#34;&gt;CVE-2020-15999&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Sergei Glazunov discovered a heap-based buffer overflow vulnerability in
the handling of embedded PNG bitmaps in FreeType. Opening malformed fonts
may result in denial of service or the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-302-1 poppler security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-302-1-poppler/</link>
      <pubDate>Sun, 25 Oct 2020 23:53:57 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-302-1-poppler/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-302-1-poppler/">
      
&lt;p&gt;Package : poppler&lt;/p&gt;


&lt;p&gt;Version : 0.26.5-2&amp;#43;deb8u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10018&#34;&gt;CVE-2019-10018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14494&#34;&gt;CVE-2019-14494&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update corrects several security vulnerabilities in poppler, a PDF
rendering library, a regression introduced by the patch for CVE-2018-13988
(Debian bug #942391), and two flaws which could lead to a denial-of-service.&lt;/p&gt;
&lt;p&gt;CVE-2019-10018&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Floating point exception in the function PostScriptFunction::exec at
Function.cc
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14494&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a divide-by-zero error in the function
SplashOutputDev::tilingPatternFill at SplashOutputDev.cc.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-301-1 bluez security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-301-1-bluez/</link>
      <pubDate>Sat, 24 Oct 2020 11:02:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-301-1-bluez/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-301-1-bluez/">
      
&lt;p&gt;Package : bluez&lt;/p&gt;


&lt;p&gt;Version : 5.43-2&amp;#43;deb9u2~deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-27153&#34;&gt;CVE-2020-27153&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a double-free vulnerability in
&lt;a href=&#34;http://www.bluez.org/&#34;&gt;BlueZ&lt;/a&gt;, a suite of Bluetooth tools, utilities and
daemons.&lt;/p&gt;
&lt;p&gt;A remote attacker could potentially cause a denial of service or code
execution during service discovery, due to a redundant disconnect management
(&lt;code&gt;MGMT&lt;/code&gt;) event.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-300-1 openjdk-8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-300-1-openjdk-8/</link>
      <pubDate>Fri, 23 Oct 2020 11:40:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-300-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-300-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u272-b10-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14779&#34;&gt;CVE-2020-14779&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14781&#34;&gt;CVE-2020-14781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14782&#34;&gt;CVE-2020-14782&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14792&#34;&gt;CVE-2020-14792&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14796&#34;&gt;CVE-2020-14796&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14797&#34;&gt;CVE-2020-14797&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14798&#34;&gt;CVE-2020-14798&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14803&#34;&gt;CVE-2020-14803&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in denial of service, bypass of sandbox restrictions or
information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-299-1 spice-gtk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-299-1-spice-gtk/</link>
      <pubDate>Mon, 12 Oct 2020 05:31:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-299-1-spice-gtk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-299-1-spice-gtk/">
      
&lt;p&gt;Package : spice-gtk&lt;/p&gt;


&lt;p&gt;Version : 0.25-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14355&#34;&gt;CVE-2020-14355&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple buffer overflow vulnerabilities were found in the QUIC image
decoding process of the SPICE remote display system.&lt;/p&gt;
&lt;p&gt;Both the SPICE client (spice-gtk) and server are affected by these flaws.
These flaws allow a malicious client or server to send specially crafted
messages that, when processed by the QUIC image compression algorithm,
result in a process crash or potential code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-298-1 spice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-298-1-spice/</link>
      <pubDate>Mon, 12 Oct 2020 05:23:22 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-298-1-spice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-298-1-spice/">
      
&lt;p&gt;Package : spice&lt;/p&gt;


&lt;p&gt;Version : 0.12.5-1&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14355&#34;&gt;CVE-2020-14355&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple buffer overflow vulnerabilities were found in the QUIC image
decoding process of the SPICE remote display system, before spice-0.14.2-1.&lt;/p&gt;
&lt;p&gt;Both the SPICE client (spice-gtk) and server are affected by these flaws.
These flaws allow a malicious client or server to send specially crafted
messages that, when processed by the QUIC image compression algorithm,
result in a process crash or potential code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-297-1 packagekit security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-297-1-packagekit/</link>
      <pubDate>Sun, 11 Oct 2020 12:13:49 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-297-1-packagekit/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-297-1-packagekit/">
      
&lt;p&gt;Package : packagekit&lt;/p&gt;


&lt;p&gt;Version : 1.0.1-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16121&#34;&gt;CVE-2020-16121&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16122&#34;&gt;CVE-2020-16122&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been discovered in packagekit, a package
management service.&lt;/p&gt;
&lt;p&gt;CVE-2020-16121&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vaisha Bernard discovered that PackageKit incorrectly handled
certain methods. A local attacker could use this issue to learn the
MIME type of any file on the system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-16122&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sami Niemimäki discovered that PackageKit incorrectly handled local
deb packages. A local user could possibly use this issue to install
untrusted packages, contrary to expectations.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-296-1 httpcomponents-client security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-296-1-httpcomponents-client/</link>
      <pubDate>Sun, 11 Oct 2020 00:04:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-296-1-httpcomponents-client/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-296-1-httpcomponents-client/">
      
&lt;p&gt;Package : httpcomponents-client&lt;/p&gt;


&lt;p&gt;Version : 4.3.5-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13956&#34;&gt;CVE-2020-13956&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Oleg Kalnichevski discovered that httpcomponents-client, a Java library
for building HTTP-aware applications, can misinterpret a malformed
authority component in request URIs passed to the library as
java.net.URI object and pick the wrong target host for request
execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-295-1 rails security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-295-1-rails/</link>
      <pubDate>Fri, 09 Oct 2020 20:00:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-295-1-rails/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-295-1-rails/">
      
&lt;p&gt;Package : rails&lt;/p&gt;


&lt;p&gt;Version : 2:4.1.8-1&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8163&#34;&gt;CVE-2020-8163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15169&#34;&gt;CVE-2020-15169&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2020-8163&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A code injection vulnerability in Rails would allow an attacker who
controlled the `locals` argument of a `render` call to perform a possible
remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-15169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;There is a potential Cross-Site Scripting (XSS) vulnerability in Action
View&#39;s translation helpers. Views that allow the user to control the
default (not found) value of the `t` and `translate` helpers could be
susceptible to XSS attacks. When an HTML-unsafe string is passed as the
default for a missing translation key named html or ending in _html, the
default string is incorrectly marked as HTML-safe and not escaped.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-294-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-294-1-squid3/</link>
      <pubDate>Thu, 08 Oct 2020 23:55:42 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-294-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-294-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15049&#34;&gt;CVE-2020-15049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15810&#34;&gt;CVE-2020-15810&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15811&#34;&gt;CVE-2020-15811&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24606&#34;&gt;CVE-2020-24606&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been discovered in Squid, a high-
performance proxy caching server for web clients.&lt;/p&gt;
&lt;p&gt;CVE-2020-15049&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in http/ContentLengthInterpreter.cc in
Squid. A Request Smuggling and Poisoning attack can succeed against
the HTTP cache. The client sends an HTTP request with a Content-
Length header containing &amp;quot;+\ &amp;quot;-&amp;quot; or an uncommon shell whitespace
character prefix to the length field-value.
This update also includes several other improvements to the
HttpHeader parsing code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-15810 and CVE-2020-15811&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Due to incorrect data validation, HTTP Request Smuggling attacks may
succeed against HTTP and HTTPS traffic. This leads to cache
poisoning and allows any client, including browser scripts, to
bypass local security and poison the proxy cache and any downstream
caches with content from an arbitrary source. When configured for
relaxed header parsing (the default), Squid relays headers
containing whitespace characters to upstream servers. When this
occurs as a prefix to a Content-Length header, the frame length
specified will be ignored by Squid (allowing for a conflicting
length to be used from another Content-Length header) but relayed
upstream.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24606&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Squid allows a trusted peer to perform Denial of Service by
consuming all available CPU cycles during handling of a crafted
Cache Digest response message. This only occurs when cache_peer is
used with the cache digests feature. The problem exists because
peerDigestHandleReply() livelocking in peer_digest.cc mishandles
EOF.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-293-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-293-1-php5/</link>
      <pubDate>Wed, 07 Oct 2020 15:09:24 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-293-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-293-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.6.40&amp;#43;dfsg-0&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7070&#34;&gt;CVE-2020-7070&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in PHP, a server-side, HTML-embedded
scripting language.  When PHP is processing incoming HTTP cookie values,
the cookie names are url-decoded. This may lead to cookies with prefixes
like __Host confused with cookies that decode to such prefix, thus
leading to an attacker being able to forge a cookie which is supposed to
be secure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-292-1 libonig security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-292-1-libonig/</link>
      <pubDate>Fri, 02 Oct 2020 17:24:20 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-292-1-libonig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-292-1-libonig/">
      
&lt;p&gt;Package : libonig&lt;/p&gt;


&lt;p&gt;Version : 5.9.5-3.2&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26159&#34;&gt;CVE-2020-26159&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In Oniguruma, an attacker able to supply a regular expression
for compilation may be able to overflow a buffer by one byte
in &lt;code&gt;concat_opt_exact_info_str&lt;/code&gt; &amp;amp; &lt;code&gt;concat_opt_exact_info&lt;/code&gt; in
&lt;code&gt;regcomp.c&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Besides, there were other other issues like resource leaks in
&lt;code&gt;bbuf_clone()&lt;/code&gt;, &lt;code&gt;not_code_range_buf()&lt;/code&gt;, etc in &lt;code&gt;regparse.c&lt;/code&gt; and
some other issues that needed fixing as well.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-291-1 libproxy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-291-1-libproxy/</link>
      <pubDate>Fri, 02 Oct 2020 01:13:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-291-1-libproxy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-291-1-libproxy/">
      
&lt;p&gt;Package : libproxy&lt;/p&gt;


&lt;p&gt;Version : 0.4.11-4&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26154&#34;&gt;CVE-2020-26154&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Li Fei discovered a possible buffer overflow vulnerability in libroxy when a
server serving a PAC file sends more than 102400 bytes without a Content-Length
present.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-290-1 ruby2.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-290-1-ruby2.1/</link>
      <pubDate>Thu, 01 Oct 2020 19:44:12 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-290-1-ruby2.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-290-1-ruby2.1/">
      
&lt;p&gt;Package : ruby2.1&lt;/p&gt;


&lt;p&gt;Version : 2.1.5-2&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25613&#34;&gt;CVE-2020-25613&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A potential HTTP request smuggling vulnerability in WEBrick was reported.&lt;/p&gt;
&lt;p&gt;WEBrick (bundled along with ruby2.1) was too tolerant against an invalid
Transfer-Encoding header. This may lead to inconsistent interpretation
between WEBrick and some HTTP proxy servers, which may allow the attacker
to “smuggle” a request.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-289-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-289-1-python3.4/</link>
      <pubDate>Wed, 30 Sep 2020 16:14:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-289-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-289-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20907&#34;&gt;CVE-2019-20907&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-26116&#34;&gt;CVE-2020-26116&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in Python 3.4, an interactive high-level
object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2019-20907
Avoid infinite loop with crafted tar file by improving header validation.&lt;/p&gt;
&lt;p&gt;CVE-2020-26116
Avoid injection of HTTP headers via the HTTP method without rejecting newline characters.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-288-1 libxrender security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-288-1-libxrender/</link>
      <pubDate>Wed, 30 Sep 2020 15:42:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-288-1-libxrender/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-288-1-libxrender/">
      
&lt;p&gt;Package : libxrender&lt;/p&gt;


&lt;p&gt;Version : 1:0.9.8-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-7949&#34;&gt;CVE-2016-7949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-7950&#34;&gt;CVE-2016-7950&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in libxrender, a X Rendering Extension client library.&lt;/p&gt;
&lt;p&gt;Tobias Stoeckmann from the OpenBSD project has discovered issues in the
way various X client libraries handle the responses they receive from
servers. Insufficient validation of data from the X server could cause
out of boundary memory writes in the libXrender library potentially
allowing the user to escalate their privileges.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-287-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-287-1-openjdk-7/</link>
      <pubDate>Wed, 30 Sep 2020 09:22:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-287-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-287-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u271-2.6.23-1~deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14577&#34;&gt;CVE-2020-14577&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14578&#34;&gt;CVE-2020-14578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14579&#34;&gt;CVE-2020-14579&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14581&#34;&gt;CVE-2020-14581&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14583&#34;&gt;CVE-2020-14583&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14593&#34;&gt;CVE-2020-14593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14621&#34;&gt;CVE-2020-14621&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in denial of service, bypass of access/sandbox restrictions or
information disclosure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-286-1 clamav security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-286-1-clamav/</link>
      <pubDate>Tue, 29 Sep 2020 15:14:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-286-1-clamav/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-286-1-clamav/">
      
&lt;p&gt;Package : clamav&lt;/p&gt;


&lt;p&gt;Version : 0.102.4&amp;#43;dfsg-0&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-3350&#34;&gt;CVE-2020-3350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-3481&#34;&gt;CVE-2020-3481&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in the ClamAV antivirus toolkit:&lt;/p&gt;
&lt;p&gt;CVE-2020-3350&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A malicious user could trick clamscan, clamdscan or clamonacc into
moving or removing a different file than intended when those are
used with one of the --move or --remove options. This could be used
to get rid of special system files.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-3481&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The EGG archive module was vulnerable to denial of service via NULL
pointer dereference due to improper error handling. The official
signature database avoided this problem because the signatures there
avoided the use of the EGG archive parser.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-285-1 libdbi-perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-285-1-libdbi-perl/</link>
      <pubDate>Mon, 28 Sep 2020 14:54:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-285-1-libdbi-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-285-1-libdbi-perl/">
      
&lt;p&gt;Package : libdbi-perl&lt;/p&gt;


&lt;p&gt;Version : 1.631-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-7490&#34;&gt;CVE-2013-7490&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-10401&#34;&gt;CVE-2014-10401&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20919&#34;&gt;CVE-2019-20919&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14392&#34;&gt;CVE-2020-14392&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14393&#34;&gt;CVE-2020-14393&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Perl5 Database
Interface (DBI). An attacker could trigger a denial-of-service (DoS),
information disclosure and possibly execute arbitrary code.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2013-7490&lt;/p&gt;
&lt;p&gt;Using many arguments to methods for Callbacks may lead to memory
corruption.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2014-10401&lt;/p&gt;
&lt;p&gt;DBD::File drivers can open files from folders other than those
specifically passed via the f_dir attribute.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-20919&lt;/p&gt;
&lt;p&gt;The hv_fetch() documentation requires checking for NULL and the
code does that. But, shortly thereafter, it calls SvOK(profile),
causing a NULL pointer dereference.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-14392&lt;/p&gt;
&lt;p&gt;An untrusted pointer dereference flaw was found in Perl-DBI. A
local attacker who is able to manipulate calls to
dbd_db_login6_sv() could cause memory corruption, affecting the
service&amp;rsquo;s availability.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-14393&lt;/p&gt;
&lt;p&gt;A buffer overflow on via an overlong DBD class name in
dbih_setup_handle function may lead to data be written past the
intended limit.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-284-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-284-1-curl/</link>
      <pubDate>Sun, 27 Sep 2020 23:25:10 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-284-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-284-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8231&#34;&gt;CVE-2020-8231&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in curl, a command line tool for transferring data
with URL syntax.
In rare circumstances, when using the multi API of curl in combination
with CURLOPT_CONNECT_ONLY, the wrong connection  might be used when
transfering data later.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-283-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-283-1-qemu/</link>
      <pubDate>Mon, 14 Sep 2020 16:50:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-283-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-283-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20382&#34;&gt;CVE-2019-20382&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13253&#34;&gt;CVE-2020-13253&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13754&#34;&gt;CVE-2020-13754&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14364&#34;&gt;CVE-2020-14364&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16092&#34;&gt;CVE-2020-16092&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in QEMU, a fast processor
emulator (notably used in KVM and Xen HVM virtualization). An attacker
could trigger a denial-of-service (DoS) and possibly execute arbitrary
code with the privileges of the QEMU process on the host.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-20382&lt;/p&gt;
&lt;p&gt;Memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a
VNC disconnect operation because libz is misused, resulting in a
situation where memory allocated in deflateInit2 is not freed in
deflateEnd.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-13253&lt;/p&gt;
&lt;p&gt;sd_wp_addr in hw/sd/sd.c uses an unvalidated address, which leads
to an out-of-bounds read during sdhci_write() operations. A guest
OS user can crash the QEMU process.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-13754&lt;/p&gt;
&lt;p&gt;hw/pci/msix.c allows guest OS users to trigger an out-of-bounds
access via a crafted address in an msi-x mmio operation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-14364&lt;/p&gt;
&lt;p&gt;An out-of-bounds read/write access flaw was found in the USB
emulator. This issue occurs while processing USB packets from a
guest when USBDevice &amp;lsquo;setup_len&amp;rsquo; exceeds its &amp;lsquo;data_buf[4096]&amp;rsquo; in
the do_token_in, do_token_out routines. This flaw allows a guest
user to crash the QEMU process, resulting in a denial of service,
or the potential execution of arbitrary code with the privileges
of the QEMU process on the host.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-16092&lt;/p&gt;
&lt;p&gt;An assertion failure can occur in the network packet
processing. This issue affects the vmxnet3 network devices. A
malicious guest user/process could use this flaw to abort the QEMU
process on the host, resulting in a denial of service condition in
net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-282-1 libproxy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-282-1-libproxy/</link>
      <pubDate>Sat, 12 Sep 2020 10:48:26 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-282-1-libproxy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-282-1-libproxy/">
      
&lt;p&gt;Package : libproxy&lt;/p&gt;


&lt;p&gt;Version : 0.4.11-4&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-25219&#34;&gt;CVE-2020-25219&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a denial of service attack in &lt;code&gt;libproxy&lt;/code&gt;, a
library to make applications HTTP proxy aware. A remote server could cause an
infinite stack recursion.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-281-1 python-pip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-281-1-python-pip/</link>
      <pubDate>Fri, 11 Sep 2020 11:24:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-281-1-python-pip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-281-1-python-pip/">
      
&lt;p&gt;Package : python-pip&lt;/p&gt;


&lt;p&gt;Version : 1.5.6-5&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20916&#34;&gt;CVE-2019-20916&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a directory traversal attack in pip, the
Python package installer.&lt;/p&gt;
&lt;p&gt;When an URL was given in an install command, as a &lt;code&gt;Content-Disposition&lt;/code&gt; HTTP
header was permitted to have &lt;code&gt;../&lt;/code&gt; components in its filename, arbitrary local
files (eg. &lt;code&gt;/root/.ssh/authorized_keys&lt;/code&gt;) could be overidden.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-280-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-280-1-libxml2/</link>
      <pubDate>Tue, 08 Sep 2020 23:52:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-280-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-280-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.9.1&amp;#43;dfsg1-5&amp;#43;deb8u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-8872&#34;&gt;CVE-2017-8872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20388&#34;&gt;CVE-2019-20388&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7595&#34;&gt;CVE-2020-7595&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-24977&#34;&gt;CVE-2020-24977&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were corrected in libxml2, the GNOME
XML library.&lt;/p&gt;
&lt;p&gt;CVE-2017-8872&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Global buffer-overflow in the htmlParseTryOrFinish function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-20388&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak was found in the xmlSchemaValidateStream function of libxml2.
Applications that use this library may be vulnerable to memory not being
freed leading to a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-24977&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read restricted to xmllint --htmlout.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-7595&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Infinite loop in xmlStringLenDecodeEntities can cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-279-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-279-1-imagemagick/</link>
      <pubDate>Sat, 05 Sep 2020 19:35:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-279-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-279-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12806&#34;&gt;CVE-2017-12806&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13308&#34;&gt;CVE-2019-13308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13391&#34;&gt;CVE-2019-13391&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities have been addressed in imagemagick, an image processing
toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2017-12806&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory exhaustion vulnerability was found in the function format8BIM, which allows
attackers to cause a denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13308, CVE-2019-13391&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based buffer overflow in MagickCore/fourier.c in ComplexImages may
cause a denial-of-service or other unspecified results.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-278-1 ruby-rack security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-278-1-ruby-rack/</link>
      <pubDate>Sat, 05 Sep 2020 12:30:32 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-278-1-ruby-rack/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-278-1-ruby-rack/">
      
&lt;p&gt;Package : ruby-rack&lt;/p&gt;


&lt;p&gt;Version : 1.5.2-3&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8184&#34;&gt;CVE-2020-8184&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A reliance on cookies without validation/integrity check security
vulnerability exists in rack &amp;lt; 2.2.3, rack &amp;lt; 2.1.4 that makes it
is possible for an attacker to forge a secure or host-only cookie
prefix.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-277-1 graphicsmagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-277-1-graphicsmagick/</link>
      <pubDate>Fri, 04 Sep 2020 23:07:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-277-1-graphicsmagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-277-1-graphicsmagick/">
      
&lt;p&gt;Package : graphicsmagick&lt;/p&gt;


&lt;p&gt;Version : 1.3.20-3&amp;#43;deb8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-10800&#34;&gt;CVE-2017-10800&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;When GraphicsMagick processes a MATLAB image, it can lead to a denial of
service, if the size specified for a MAT Object is larger than the actual
amount of data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-276-1 libjpeg-turbo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-276-1-libjpeg-turbo/</link>
      <pubDate>Fri, 04 Sep 2020 22:08:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-276-1-libjpeg-turbo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-276-1-libjpeg-turbo/">
      
&lt;p&gt;Package : libjpeg-turbo&lt;/p&gt;


&lt;p&gt;Version : 1:1.3.1-12&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13790&#34;&gt;CVE-2020-13790&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14152&#34;&gt;CVE-2020-14152&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were discovered in libjpeg-turbo, a library for
handling JPEG image files.&lt;/p&gt;
&lt;p&gt;CVE-2020-13790&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based buffer over-read via a PPM input file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-14152&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper handling of max_memory_to_use setting can lead to excessive memory
consumption.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-275-1 libx11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-275-1-libx11/</link>
      <pubDate>Thu, 03 Sep 2020 04:43:06 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-275-1-libx11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-275-1-libx11/">
      
&lt;p&gt;Package : libx11&lt;/p&gt;


&lt;p&gt;Version : 2:1.6.2-3&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14363&#34;&gt;CVE-2020-14363&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jayden Rivers found an integer overflow in the init_om function of
libX11, the X11 client-side library, which could lead to a double
free.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-274-1 uwsgi security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-274-1-uwsgi/</link>
      <pubDate>Thu, 03 Sep 2020 04:09:15 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-274-1-uwsgi/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-274-1-uwsgi/">
      
&lt;p&gt;Package : uwsgi&lt;/p&gt;


&lt;p&gt;Version : 2.0.7-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11984&#34;&gt;CVE-2020-11984&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Apache HTTP Server versions before 2.4.32 uses src:uwsgi where a flaw
was discovered. The uwsgi protocol does not let us serialize more
than 16K of HTTP header leading to resource exhaustion and denial of
service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-273-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-273-1-nss/</link>
      <pubDate>Mon, 31 Aug 2020 20:33:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-273-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-273-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12403&#34;&gt;CVE-2020-12403&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The ChaCha20 symmetric key cipher algorithm did not correctly enforce the tag
length which may have led to an out-of-bounds read and a lack of
confidentiality.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-272-1 xorg-server security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-272-1-xorg-server/</link>
      <pubDate>Sun, 30 Aug 2020 23:43:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-272-1-xorg-server/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-272-1-xorg-server/">
      
&lt;p&gt;Package : xorg-server&lt;/p&gt;


&lt;p&gt;Version : 2:1.16.4-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14345&#34;&gt;CVE-2020-14345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14346&#34;&gt;CVE-2020-14346&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14347&#34;&gt;CVE-2020-14347&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14361&#34;&gt;CVE-2020-14361&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14362&#34;&gt;CVE-2020-14362&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Basically all issues in xorg-server, the X server from xorg, are
out-of-bounds access or integer underflows in different request
handlers. One CVE is about a leak of uninitialize heap memory
to clients.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-271-1 squid3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-271-1-squid3/</link>
      <pubDate>Sun, 30 Aug 2020 22:28:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-271-1-squid3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-271-1-squid3/">
      
&lt;p&gt;Package : squid3&lt;/p&gt;


&lt;p&gt;Version : 3.5.23-5&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19132&#34;&gt;CVE-2018-19132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12519&#34;&gt;CVE-2019-12519&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12520&#34;&gt;CVE-2019-12520&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12521&#34;&gt;CVE-2019-12521&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12523&#34;&gt;CVE-2019-12523&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12524&#34;&gt;CVE-2019-12524&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12525&#34;&gt;CVE-2019-12525&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12526&#34;&gt;CVE-2019-12526&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12528&#34;&gt;CVE-2019-12528&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12529&#34;&gt;CVE-2019-12529&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13345&#34;&gt;CVE-2019-13345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18676&#34;&gt;CVE-2019-18676&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18677&#34;&gt;CVE-2019-18677&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18678&#34;&gt;CVE-2019-18678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18679&#34;&gt;CVE-2019-18679&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18860&#34;&gt;CVE-2019-18860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8449&#34;&gt;CVE-2020-8449&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8450&#34;&gt;CVE-2020-8450&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11945&#34;&gt;CVE-2020-11945&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that Squid, a high-performance proxy caching server for
web clients, has been affected by multiple security vulnerabilities.
Due to incorrect input validation and URL request handling it was
possible to bypass access restrictions for restricted HTTP servers
and to cause a denial-of-service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-270-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-270-1-bind9/</link>
      <pubDate>Sun, 30 Aug 2020 17:31:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-270-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-270-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.9.5.dfsg-9&amp;#43;deb8u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8622&#34;&gt;CVE-2020-8622&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Crafted responses to TSIG-signed requests could lead to an assertion
failure, causing named, a Domain Name Server, to exit. This could be
done by malicious server operators or guessing attackers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-269-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-269-1-apache2/</link>
      <pubDate>Sun, 30 Aug 2020 20:43:07 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-269-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-269-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.4.10-10&amp;#43;deb8u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11985&#34;&gt;CVE-2020-11985&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;apache2 was vulnerable to IP address spoofing when proxying using mod_remoteip
and mod_rewrite.&lt;/p&gt;
&lt;p&gt;For configurations using proxying with mod_remoteip and certain mod_rewrite rules,
an attacker could spoof their IP address for logging and PHP scripts.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-268-1 squirrelmail security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-268-1-squirrelmail/</link>
      <pubDate>Fri, 28 Aug 2020 14:26:56 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-268-1-squirrelmail/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-268-1-squirrelmail/">
      
&lt;p&gt;Package : squirrelmail&lt;/p&gt;


&lt;p&gt;Version : 2:1.4.23~svn20120406-2&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14932&#34;&gt;CVE-2020-14932&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14933&#34;&gt;CVE-2020-14933&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two unsafe serialisation vulnerabilities were discovered in the PHP-based
&lt;code&gt;squirrelmail&lt;/code&gt; webmail client.&lt;/p&gt;
&lt;p&gt;Unsafe data was accepted to the &lt;code&gt;mailto.php&lt;/code&gt; script which opened an email
compose screen with the passed email address.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-267-1 postgresql-9.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-267-1-postgresql-9.4/</link>
      <pubDate>Wed, 26 Aug 2020 15:15:43 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-267-1-postgresql-9.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-267-1-postgresql-9.4/">
      
&lt;p&gt;Package : postgresql-9.4&lt;/p&gt;


&lt;p&gt;Version : 9.4.26-0&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14350&#34;&gt;CVE-2020-14350&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Andres Freund found an issue in the PostgreSQL database system where an
uncontrolled search path could allow users to run arbitrary SQL functions
with elevated priviledges when a superuser runs certain `CREATE EXTENSION&#39;
statements.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-266-1 software-properties security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-266-1-software-properties/</link>
      <pubDate>Sat, 22 Aug 2020 18:13:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-266-1-software-properties/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-266-1-software-properties/">
      
&lt;p&gt;Package : software-properties&lt;/p&gt;


&lt;p&gt;Version : 0.92.25debian1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15709&#34;&gt;CVE-2020-15709&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jason A. Donenfeld found an ansi escape sequence injection into
software-properties, a manager for apt repository sources. An attacker
could manipulate the screen of a user prompted to install an
additional repository (PPA).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-265-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-265-1-python2.7/</link>
      <pubDate>Sat, 22 Aug 2020 15:54:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-265-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-265-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.9-2-ds1&amp;#43;deb8u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20907&#34;&gt;CVE-2019-20907&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in python2.7, an interactive high-level object-oriented language.&lt;/p&gt;
&lt;p&gt;Opening a crafted tar file could result in an infinite loop due to missing header validation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-264-1 openjdk-8 new package</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-264-1-openjdk-8/</link>
      <pubDate>Fri, 21 Aug 2020 19:25:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-264-1-openjdk-8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-264-1-openjdk-8/">
      
&lt;p&gt;Package : openjdk-8&lt;/p&gt;


&lt;p&gt;Version : 8u265-b01-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;This update brings OpenJDK 8 to Debian 8 jessie. This will become the
default Java version in a separate update.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-263-1 qtbase-opensource-src security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-263-1-qtbase-opensource-src/</link>
      <pubDate>Fri, 21 Aug 2020 15:10:59 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-263-1-qtbase-opensource-src/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-263-1-qtbase-opensource-src/">
      
&lt;p&gt;Package : qtbase-opensource-src&lt;/p&gt;


&lt;p&gt;Version : 5.3.2&amp;#43;dfsg-4&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-17507&#34;&gt;CVE-2020-17507&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in &lt;code&gt;qtbase-opensource-src&lt;/code&gt;, the cross-platform
C++ application framework. A specially-crafted XBM image file could have caused
a buffer overread.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-262-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-262-1-ghostscript/</link>
      <pubDate>Thu, 20 Aug 2020 17:59:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-262-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-262-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.26a~dfsg-0&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16287&#34;&gt;CVE-2020-16287&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16288&#34;&gt;CVE-2020-16288&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16289&#34;&gt;CVE-2020-16289&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16290&#34;&gt;CVE-2020-16290&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16291&#34;&gt;CVE-2020-16291&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16292&#34;&gt;CVE-2020-16292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16293&#34;&gt;CVE-2020-16293&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16294&#34;&gt;CVE-2020-16294&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16295&#34;&gt;CVE-2020-16295&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16296&#34;&gt;CVE-2020-16296&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16297&#34;&gt;CVE-2020-16297&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16298&#34;&gt;CVE-2020-16298&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16299&#34;&gt;CVE-2020-16299&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16300&#34;&gt;CVE-2020-16300&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16301&#34;&gt;CVE-2020-16301&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16302&#34;&gt;CVE-2020-16302&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16303&#34;&gt;CVE-2020-16303&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16304&#34;&gt;CVE-2020-16304&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16305&#34;&gt;CVE-2020-16305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16306&#34;&gt;CVE-2020-16306&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16307&#34;&gt;CVE-2020-16307&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16308&#34;&gt;CVE-2020-16308&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16309&#34;&gt;CVE-2020-16309&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16310&#34;&gt;CVE-2020-16310&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-17538&#34;&gt;CVE-2020-17538&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were found in ghostscript, an interpreter for
the PostScript language and for PDF, allowing an attacker to escalate
privileges and cause denial of service via crafted PS/EPS/PDF files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-261-1 qt4-x11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-261-1-qt4-x11/</link>
      <pubDate>Thu, 20 Aug 2020 16:57:20 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-261-1-qt4-x11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-261-1-qt4-x11/">
      
&lt;p&gt;Package : qt4-x11&lt;/p&gt;


&lt;p&gt;Version : 4:4.8.6&amp;#43;git64-g5dc8b2b&amp;#43;dfsg-3&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-17507&#34;&gt;CVE-2020-17507&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in &lt;code&gt;qt4-x11&lt;/code&gt;, the cross-platform C++ application
framework. A specially-crafted XBM image file could have caused a buffer
overread.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-260-1 dovecot security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-260-1-dovecot/</link>
      <pubDate>Sat, 15 Aug 2020 22:10:21 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-260-1-dovecot/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-260-1-dovecot/">
      
&lt;p&gt;Package : dovecot&lt;/p&gt;


&lt;p&gt;Version : 1:2.2.13-12~deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12100&#34;&gt;CVE-2020-12100&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12673&#34;&gt;CVE-2020-12673&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12674&#34;&gt;CVE-2020-12674&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Dovecot email
server.&lt;/p&gt;
&lt;p&gt;CVE-2020-12100&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Receiving mail with deeply nested MIME parts leads to resource
exhaustion as Dovecot attempts to parse it.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12673&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dovecot&#39;s NTLM implementation does not correctly check message
buffer size, which leads to a crash when reading past allocation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12674&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dovecot&#39;s RPA mechanism implementation accepts zero-length message,
which leads to assert-crash later on.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-259-1 pillow security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-259-1-pillow/</link>
      <pubDate>Sat, 08 Aug 2020 23:35:05 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-259-1-pillow/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-259-1-pillow/">
      
&lt;p&gt;Package : pillow&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-2&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10177&#34;&gt;CVE-2020-10177&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was noticed that in Pillow before 7.1.0, there are multiple
out-of-bounds reads in libImaging/FliDecode.c.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-258-1 gupnp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-258-1-gupnp/</link>
      <pubDate>Thu, 06 Aug 2020 18:38:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-258-1-gupnp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-258-1-gupnp/">
      
&lt;p&gt;Package : gupnp&lt;/p&gt;


&lt;p&gt;Version : 0.20.12-1&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12695&#34;&gt;CVE-2020-12695&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Yunus Çadırcı found an issue in the SUBSCRIBE method of UPnP, a
network protocol for devices to automatically discover and communicate
with each other. Insufficient checks on this method allowed attackers
to use vulnerable UPnP services for DoS attacks or possibly to bypass
firewalls.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-257-1 net-snmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-257-1-net-snmp/</link>
      <pubDate>Tue, 04 Aug 2020 15:52:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-257-1-net-snmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-257-1-net-snmp/">
      
&lt;p&gt;Package : net-snmp&lt;/p&gt;


&lt;p&gt;Version : 5.7.2.1&amp;#43;dfsg-1&amp;#43;deb8u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15861&#34;&gt;CVE-2020-15861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15862&#34;&gt;CVE-2020-15862&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A privilege escalation vulnerability was discovered in
&lt;a href=&#34;http://www.net-snmp.org/&#34;&gt;Net-SNMP&lt;/a&gt; due to incorrect symlink handling
(&lt;code&gt;CVE-2020-15861&lt;/code&gt;).&lt;/p&gt;
&lt;p&gt;This security update also applies an upstream fix to their previous handling of
&lt;code&gt;CVE-2020-15862&lt;/code&gt; as part of
&lt;a href=&#34;https://deb.freexian.com/extended-lts/updates/ela-252-1-net-snmp/&#34;&gt;ELA-252-1&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-256-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-256-1-nss/</link>
      <pubDate>Sun, 02 Aug 2020 23:54:40 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-256-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-256-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu8u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-6829&#34;&gt;CVE-2020-6829&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12400&#34;&gt;CVE-2020-12400&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12401&#34;&gt;CVE-2020-12401&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were fixed in nss, the Network Security
Services library.  The ECDSA signature generation in P-384 and P-521 was
found to be vulnerable to a side channel attack in the modular inversion
function implementation.  The ECDSA implementation was also found to be
vulnerable to a timing attack mitigation bypass.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-255-1 libx11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-255-1-libx11/</link>
      <pubDate>Mon, 03 Aug 2020 02:03:45 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-255-1-libx11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-255-1-libx11/">
      
&lt;p&gt;Package : libx11&lt;/p&gt;


&lt;p&gt;Version : 2:1.6.2-3&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14344&#34;&gt;CVE-2020-14344&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The X Input Method (XIM) client implementation in libX11 has some
integer overflows and signed/unsigned comparison issues that can
lead to heap corruption when handling malformed messages from an
input method.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-254-1 libssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-254-1-libssh/</link>
      <pubDate>Fri, 31 Jul 2020 00:33:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-254-1-libssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-254-1-libssh/">
      
&lt;p&gt;Package : libssh&lt;/p&gt;


&lt;p&gt;Version : 0.6.3-4&amp;#43;deb8u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-16135&#34;&gt;CVE-2020-16135&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The code in src/sftpserver.c did not verify the validity of certain pointers
and expected them to be valid. A NULL pointer dereference could have been
occured that typically causes a crash and thus a denial-of-service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-253-1 imagemagick security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-253-1-imagemagick/</link>
      <pubDate>Thu, 30 Jul 2020 15:18:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-253-1-imagemagick/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-253-1-imagemagick/">
      
&lt;p&gt;Package : imagemagick&lt;/p&gt;


&lt;p&gt;Version : 8:6.8.9.9-5&amp;#43;deb8u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-12805&#34;&gt;CVE-2017-12805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17681&#34;&gt;CVE-2017-17681&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18252&#34;&gt;CVE-2017-18252&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7443&#34;&gt;CVE-2018-7443&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8804&#34;&gt;CVE-2018-8804&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8960&#34;&gt;CVE-2018-8960&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9133&#34;&gt;CVE-2018-9133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10177&#34;&gt;CVE-2018-10177&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18024&#34;&gt;CVE-2018-18024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20467&#34;&gt;CVE-2018-20467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10131&#34;&gt;CVE-2019-10131&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11472&#34;&gt;CVE-2019-11472&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12977&#34;&gt;CVE-2019-12977&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12978&#34;&gt;CVE-2019-12978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12979&#34;&gt;CVE-2019-12979&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13300&#34;&gt;CVE-2019-13300&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13307&#34;&gt;CVE-2019-13307&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13454&#34;&gt;CVE-2019-13454&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple security vulnerabilities were fixed in Imagemagick. Various memory
handling problems and cases of missing or incomplete input sanitising may
result in denial of service and memory or CPU exhaustion.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-252-1 net-snmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-252-1-net-snmp/</link>
      <pubDate>Wed, 29 Jul 2020 12:39:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-252-1-net-snmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-252-1-net-snmp/">
      
&lt;p&gt;Package : net-snmp&lt;/p&gt;


&lt;p&gt;Version : 5.7.2.1&amp;#43;dfsg-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15862&#34;&gt;CVE-2020-15862&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A privilege escalation vulnerability was discovered in
&lt;a href=&#34;http://net-snmp.sourceforge.net/&#34;&gt;Net-SNMP&lt;/a&gt;, a set of tools for collecting and
organising information about devices on computer networks.&lt;/p&gt;
&lt;p&gt;Upstream notes that:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;It is still possible to enable this MIB via the &lt;code&gt;--with-mib-modules&lt;/code&gt;
configure option.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Another MIB that provides similar functionality, namely
&lt;code&gt;ucd-snmp/extensible&lt;/code&gt;, is disabled by default.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The security risk of &lt;code&gt;ucd-snmp/pass&lt;/code&gt; and &lt;code&gt;ucd-snmp/pass_persist&lt;/code&gt; is lower
since these modules only introduce a security risk if the invoked scripts are
exploitable.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-251-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-251-1-curl/</link>
      <pubDate>Mon, 27 Jul 2020 22:36:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-251-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-251-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.38.0-4&amp;#43;deb8u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8177&#34;&gt;CVE-2020-8177&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in curl, a command line tool for transferring
data with URL syntax.&lt;/p&gt;
&lt;p&gt;When using when using -J (&amp;ndash;remote-header-name) and -i (&amp;ndash;include) in
the same command line, a malicious server could force curl to overwrite
the contents of local files with incoming HTTP headers.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-250-1 luajit security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-250-1-luajit/</link>
      <pubDate>Mon, 27 Jul 2020 16:23:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-250-1-luajit/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-250-1-luajit/">
      
&lt;p&gt;Package : luajit&lt;/p&gt;


&lt;p&gt;Version : 2.0.3&amp;#43;dfsg-3&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15890&#34;&gt;CVE-2020-15890&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in luajit, a just in time compiler for Lua.&lt;/p&gt;
&lt;p&gt;An out-of-bounds read could happen because __gc handler frame traversal is mishandled.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-249-1 qemu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-249-1-qemu/</link>
      <pubDate>Sun, 26 Jul 2020 00:27:11 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-249-1-qemu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-249-1-qemu/">
      
&lt;p&gt;Package : qemu&lt;/p&gt;


&lt;p&gt;Version : 1:2.1&amp;#43;dfsg-12&amp;#43;deb8u16&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13659&#34;&gt;CVE-2020-13659&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15863&#34;&gt;CVE-2020-15863&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There were two following CVE(s) reported against &lt;code&gt;src:qemu&lt;/code&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CVE-2020-13659&lt;/code&gt;: &lt;code&gt;address_space_map&lt;/code&gt; in &lt;code&gt;exec.c&lt;/code&gt; in QEMU 4.2.0
can trigger a NULL pointer dereference related to &lt;code&gt;BounceBuffer&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;CVE-2020-15863&lt;/code&gt;: stack-based overflow in &lt;code&gt;xgmac_enet_send()&lt;/code&gt; in
&lt;code&gt;hw/net/xgmac.c&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-248-1 librsvg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-248-1-librsvg/</link>
      <pubDate>Wed, 22 Jul 2020 12:50:33 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-248-1-librsvg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-248-1-librsvg/">
      
&lt;p&gt;Package : librsvg&lt;/p&gt;


&lt;p&gt;Version : 2.40.5-1&amp;#43;deb8u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-6163&#34;&gt;CVE-2016-6163&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20446&#34;&gt;CVE-2019-20446&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been fixed in librsvg, a library for rendering SVG
files. This update corrects some denial of service via infinite loop
or exponential element processing when parsing specially crafted files,
as well as some memory safety issues.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-247-1 nginx security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-247-1-nginx/</link>
      <pubDate>Mon, 20 Jul 2020 15:25:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-247-1-nginx/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-247-1-nginx/">
      
&lt;p&gt;Package : nginx&lt;/p&gt;


&lt;p&gt;Version : 1.6.2-5&amp;#43;deb8u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20372&#34;&gt;CVE-2019-20372&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11724&#34;&gt;CVE-2020-11724&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two HTTP request smuggling issues were discovered in nginx, a
high-performance web and reverse proxy server, as well as in its
ngx_lua plugin.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-246-1 glib-networking security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-246-1-glib-networking/</link>
      <pubDate>Mon, 20 Jul 2020 09:53:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-246-1-glib-networking/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-246-1-glib-networking/">
      
&lt;p&gt;Package : glib-networking&lt;/p&gt;


&lt;p&gt;Version : 2.42.0-2&amp;#43;deb8u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13645&#34;&gt;CVE-2020-13645&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;GLib networking, the network extensions for GLib, failed to verify
certificates&amp;rsquo; hostnames if the application didn&amp;rsquo;t specify the server
identity.&lt;/p&gt;
&lt;p&gt;Applications must provide a server identity or GLib will fail with
G_TLS_CERTIFICATE_BAD_IDENTITY.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-245-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-245-1-libdatetime-timezone-perl/</link>
      <pubDate>Mon, 20 Jul 2020 09:47:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-245-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-245-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.75-2&amp;#43;2020a&lt;/p&gt;


      &lt;p&gt;This update brings the Olson database changes from the 2020a version to
the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-244-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-244-1-tzdata/</link>
      <pubDate>Mon, 20 Jul 2020 09:44:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-244-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-244-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2020a-0&amp;#43;deb8u1&lt;/p&gt;


      &lt;p&gt;This update brings the timezone changes from the upstream 2020a release.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-243-1 tomcat8 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-243-1-tomcat8/</link>
      <pubDate>Wed, 15 Jul 2020 23:42:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-243-1-tomcat8/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-243-1-tomcat8/">
      
&lt;p&gt;Package : tomcat8&lt;/p&gt;


&lt;p&gt;Version : 8.0.14-1&amp;#43;deb8u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13935&#34;&gt;CVE-2020-13935&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The payload length in a WebSocket frame was not correctly validated. Invalid
payload lengths could trigger an infinite loop. Multiple requests with invalid
payload lengths could lead to a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-242-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-242-1-tomcat7/</link>
      <pubDate>Wed, 15 Jul 2020 20:12:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-242-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-242-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.56-3&amp;#43;really7.0.100-1&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13935&#34;&gt;CVE-2020-13935&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The payload length in a WebSocket frame was not correctly validated. Invalid
payload lengths could trigger an infinite loop. Multiple requests with invalid
payload lengths could lead to a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-241-1 openjpeg2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-241-1-openjpeg2/</link>
      <pubDate>Mon, 13 Jul 2020 17:24:41 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-241-1-openjpeg2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-241-1-openjpeg2/">
      
&lt;p&gt;Package : openjpeg2&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-2&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-15389&#34;&gt;CVE-2020-15389&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can
be triggered if there is a mix of valid and invalid files in a directory
operated on by the decompressor.&lt;br&gt;
Triggering a double-free may also be possible. This is related to calling
opj_image_destroy twice.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-240-1 wpa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-240-1-wpa/</link>
      <pubDate>Mon, 13 Jul 2020 14:57:10 +0530</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-240-1-wpa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-240-1-wpa/">
      
&lt;p&gt;Package : wpa&lt;/p&gt;


&lt;p&gt;Version : 2.3-1&amp;#43;deb8u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12695&#34;&gt;CVE-2020-12695&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Open Connectivity Foundation UPnP specification before 2020-04-17
does not forbid the acceptance of a subscription request with a delivery
URL on a different network segment than the fully qualified
event-subscription URL, aka the CallStranger issue.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-239-1 python3.4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-239-1-python3.4/</link>
      <pubDate>Sat, 04 Jul 2020 14:34:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-239-1-python3.4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-239-1-python3.4/">
      
&lt;p&gt;Package : python3.4&lt;/p&gt;


&lt;p&gt;Version : 3.4.2-1&amp;#43;deb8u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-1753&#34;&gt;CVE-2013-1753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-1000110&#34;&gt;CVE-2016-1000110&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16935&#34;&gt;CVE-2019-16935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18348&#34;&gt;CVE-2019-18348&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8492&#34;&gt;CVE-2020-8492&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-14422&#34;&gt;CVE-2020-14422&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues were discovered in Python 3.4, an interactive
high-level object-oriented language, that allow an attacker to cause
denial of service, trafic redirection, header injection and cross-site
scripting.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2013-1753&lt;/p&gt;
&lt;p&gt;The gzip_decode function in the xmlrpc client library allows
remote attackers to cause a denial of service (memory consumption)
via a crafted HTTP request.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2016-1000110&lt;/p&gt;
&lt;p&gt;The CGIHandler class does not protect against the HTTP_PROXY
variable name clash in a CGI script, which could allow a remote
attacker to redirect HTTP requests.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-16935&lt;/p&gt;
&lt;p&gt;The documentation XML-RPC server has XSS via the server_title
field. This occurs in Lib/xmlrpc/server.py. If set_server_title is
called with untrusted input, arbitrary JavaScript can be delivered
to clients that visit the http URL for this server.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-18348&lt;/p&gt;
&lt;p&gt;In urllib2, CRLF injection is possible if the attacker controls a
url parameter, as demonstrated by the first argument to
urllib.request.urlopen with \r\n (specifically in the host
component of a URL) followed by an HTTP header.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-8492&lt;/p&gt;
&lt;p&gt;Python allows an HTTP server to conduct Regular Expression Denial
of Service (ReDoS) attacks against a client because of
urllib.request.AbstractBasicAuthHandler catastrophic backtracking.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-14422&lt;/p&gt;
&lt;p&gt;Lib/ipaddress.py improperly computes hash values in the
IPv4Interface and IPv6Interface classes, which might allow a
remote attacker to cause a denial of service if an application is
affected by the performance of a dictionary containing
IPv4Interface or IPv6Interface objects, and this attacker can
cause many dictionary entries to be created.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-238-1 perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-238-1-perl/</link>
      <pubDate>Fri, 03 Jul 2020 12:41:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-238-1-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-238-1-perl/">
      
&lt;p&gt;Package : perl&lt;/p&gt;


&lt;p&gt;Version : 5.20.2-3&amp;#43;deb8u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10543&#34;&gt;CVE-2020-10543&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10878&#34;&gt;CVE-2020-10878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12723&#34;&gt;CVE-2020-12723&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities where found in Perl&amp;rsquo;s regular expression compiler.
An application that compiles untrusted regular expressions could be exploited
to cause denial of service or code injection.&lt;/p&gt;
&lt;p&gt;It is discouraged to allow untrusted regular expressions to be compiled by Perl.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-237-1 batik security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-237-1-batik/</link>
      <pubDate>Thu, 02 Jul 2020 12:00:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-237-1-batik/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-237-1-batik/">
      
&lt;p&gt;Package : batik&lt;/p&gt;


&lt;p&gt;Version : 1.7&amp;#43;dfsg-5&amp;#43;deb8u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17566&#34;&gt;CVE-2019-17566&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Apache Batik library can be made to perform arbitrary GET requests
via xlink:href attributes on SVG files. Since there can be legitimate
use cases for xlink:href attributes, this update introduces a new option,
-blockExternalResources, that can be used to prevent fetching external
resources.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-236-1 wheezy-elts end of life</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-236-1-wheezy-elts/</link>
      <pubDate>Thu, 02 Jul 2020 11:47:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-236-1-wheezy-elts/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-236-1-wheezy-elts/">
      
&lt;p&gt;Package : wheezy-elts&lt;/p&gt;



      &lt;p&gt;The Extended Long Term Support (ELTS) Team hereby announces that Debian 7
&amp;ldquo;Wheezy&amp;rdquo; support has reached its end-of-life on June 30, 2020,
seven years after its initial release on May 4, 2013.&lt;/p&gt;
&lt;p&gt;We highly encourage any remaining Wheezy users to upgrade to a supported
Debian version. The ELTS Team will continue to provide support for
Debian 8 &amp;ldquo;Jessie&amp;rdquo;, while Debian 9 &amp;ldquo;Stretch&amp;rdquo; and Debian 10 &amp;ldquo;Buster&amp;rdquo; are
still supported by the LTS and Debian security teams, respectively.&lt;/p&gt;
&lt;p&gt;Freexian and the ELTS Team would like to thank all the users and sponsors
that made this initiative possible, and encourage any interested parties to
contribute to the extended support of Jessie.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-235-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-235-1-linux/</link>
      <pubDate>Sat, 13 Jun 2020 22:36:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-235-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-235-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.84-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-8839&#34;&gt;CVE-2015-8839&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14610&#34;&gt;CVE-2018-14610&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14611&#34;&gt;CVE-2018-14611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14612&#34;&gt;CVE-2018-14612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14613&#34;&gt;CVE-2018-14613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5108&#34;&gt;CVE-2019-5108&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19319&#34;&gt;CVE-2019-19319&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19447&#34;&gt;CVE-2019-19447&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19768&#34;&gt;CVE-2019-19768&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20636&#34;&gt;CVE-2019-20636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-0009&#34;&gt;CVE-2020-0009&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-0543&#34;&gt;CVE-2020-0543&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1749&#34;&gt;CVE-2020-1749&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2732&#34;&gt;CVE-2020-2732&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8647&#34;&gt;CVE-2020-8647&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8648&#34;&gt;CVE-2020-8648&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8649&#34;&gt;CVE-2020-8649&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-9383&#34;&gt;CVE-2020-9383&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10690&#34;&gt;CVE-2020-10690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10751&#34;&gt;CVE-2020-10751&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10942&#34;&gt;CVE-2020-10942&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11494&#34;&gt;CVE-2020-11494&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11565&#34;&gt;CVE-2020-11565&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11608&#34;&gt;CVE-2020-11608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11609&#34;&gt;CVE-2020-11609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11668&#34;&gt;CVE-2020-11668&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12114&#34;&gt;CVE-2020-12114&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12464&#34;&gt;CVE-2020-12464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12652&#34;&gt;CVE-2020-12652&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12653&#34;&gt;CVE-2020-12653&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12654&#34;&gt;CVE-2020-12654&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12769&#34;&gt;CVE-2020-12769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12770&#34;&gt;CVE-2020-12770&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12826&#34;&gt;CVE-2020-12826&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-13143&#34;&gt;CVE-2020-13143&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2015-8839&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was found in the ext4 filesystem implementation.
A local user could exploit this to cause a denial of service
(filesystem corruption).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wen Xu from SSLab at Gatech reported that crafted Btrfs volumes
could trigger a crash (Oops) and/or out-of-bounds memory access.
An attacker able to mount such a volume could use this to cause a
denial of service or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-5108&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Mitchell Frank of Cisco discovered that when the IEEE 802.11
(WiFi) stack was used in AP mode with roaming, it would trigger
roaming for a newly associated station before the station was
authenticated.  An attacker within range of the AP could use this
to cause a denial of service, either by filling up a switching
table or by redirecting traffic away from other stations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19319&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jungyeon discovered that a crafted filesystem can cause the ext4
implementation to deallocate or reallocate journal blocks.  A user
permitted to mount filesystems could use this to cause a denial of
service (crash), or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19447&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the ext4 filesystem driver did not safely
handle unlinking of an inode that, due to filesystem corruption,
already has a link count of 0.  An attacker able to mount
arbitrary ext4 volumes could use this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19768&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tristan Madani reported a race condition in the blktrace debug
facility that could result in a use-after-free.  A local user able
to trigger removal of block devices could possibly use this to
cause a denial of service (crash) or for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-20636&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found that the input subsystem did not fully
validate keycode changes, which could result in a heap
out-of-bounds write.  A local user permitted to access the device
node for an input or VT device could possibly use this to cause a
denial of service (crash or memory corruption) or for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-0009&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported that the Android ashmem driver did not prevent
read-only files from being memory-mapped and then remapped as
read-write.  However, Android drivers are not enabled in Debian
kernel configurations.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-0543&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Researchers at VU Amsterdam discovered that on some Intel CPUs
supporting the RDRAND and RDSEED instructions, part of a random
value generated by these instructions may be used in a later
speculative execution on any core of the same physical CPU.
Depending on how these instructions are used by applications, a
local user or VM guest could use this to obtain sensitive
information such as cryptographic keys from other users or VMs.

This vulnerability can be mitigated by a microcode update, either
as part of system firmware (BIOS) or through the intel-microcode
package in Debian&#39;s non-free archive section.  This kernel update
only provides reporting of the vulnerability and the option to
disable the mitigation if it is not needed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-1749&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Xiumei Mu reported that some network protocols that can run on top
of IPv6 would bypass the Transformation (XFRM) layer used by
IPsec, IPcomp/IPcomp6, IPIP, and IPv6 Mobility.  This could result
in disclosure of information over the network, since it would not
be encrypted or routed according to the system policy.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-2732&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Paulo Bonzini discovered that the KVM implementation for Intel
processors did not properly handle instruction emulation for L2
guests when nested virtualization is enabled. This could allow an
L2 guest to cause privilege escalation, denial of service, or
information leaks in the L1 guest.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8647, CVE-2020-8649&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Hulk Robot tool found a potential MMIO out-of-bounds access in
the vgacon driver.  A local user permitted to access a virtual
terminal (/dev/tty1 etc.) on a system using the vgacon driver
could use this to cause a denial of service (crash or memory
corruption) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8648&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot tool found a race condition in the the virtual terminal
driver, which could result in a use-after-free.  A local user
permitted to access a virtual terminal could use this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-9383&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jordy Zomer reported an incorrect range check in the floppy driver
which could lead to a static out-of-bounds access.  A local user
permitted to access a floppy drive could use this to cause a
denial of service (crash or memory corruption) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10690&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the PTP hardware clock subsystem did not
properly manage device lifetimes.  Removing a PTP hardware clock
from the system while a user process was using it could lead to a
use-after-free.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10751&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dmitry Vyukov reported that the SELinux subsystem did not properly
handle validating multiple messages, which could allow a privileged
attacker to bypass SELinux netlink restrictions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-10942&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the vhost_net driver did not properly
validate the type of sockets set as back-ends. A local user
permitted to access /dev/vhost-net could use this to cause a stack
corruption via crafted system calls, resulting in denial of
service (crash) or possibly privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-11494&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the slcan (serial line CAN) network driver
did not fully initialise CAN headers for received packets,
resulting in an information leak from the kernel to user-space or
over the CAN network.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-11565&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Entropy Moe reported that the shared memory filesystem (tmpfs) did
not correctly handle an &amp;quot;mpol&amp;quot; mount option specifying an empty
node list, leading to a stack-based out-of-bounds write. If user
namespaces are enabled, a local user could use this to cause a
denial of service (crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-11608, CVE-2020-11609, CVE-2020-11668&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the ov519, stv06xx, and xirlink_cit media
drivers did not properly validate USB device descriptors.  A
physically present user with a specially constructed USB device
could use this to cause a denial-of-service (crash) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12114&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Piotr Krysiuk discovered a race condition between the umount and
pivot_root operations in the filesystem core (vfs).  A local user
with the CAP_SYS_ADMIN capability in any user namespace could use
this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12464&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyungtae Kim reported a race condition in the USB core that can
result in a use-after-free.  It is not clear how this can be
exploited, but it could result in a denial of service (crash or
memory corruption) or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12652&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Tom Hatskevich reported a bug in the mptfusion storage drivers.
An ioctl handler fetched a parameter from user memory twice,
creating a race condition which could result in incorrect locking
of internal data structures.  A local user permitted to access
/dev/mptctl could use this to cause a denial of service (crash or
memory corruption) or for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12653&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the mwifiex WiFi driver did not
sufficiently validate scan requests, resulting a potential heap
buffer overflow.  A local user with CAP_NET_ADMIN capability could
use this to cause a denial of service (crash or memory corruption)
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12654&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the mwifiex WiFi driver did not
sufficiently validate WMM parameters received from an access point
(AP), resulting a potential heap buffer overflow.  A malicious AP
could use this to cause a denial of service (crash or memory
corruption) or possibly to execute code on a vulnerable system.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12769&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the spi-dw SPI host driver did not properly
serialise access to its internal state.  The security impact of
this is unclear, and this driver is not included in Debian&#39;s
binary packages.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12770&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the sg (SCSI generic) driver did not
correctly release internal resources in a particular error case.
A local user permitted to access an sg device could possibly use
this to cause a denial of service (resource exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-12826&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Adam Zabrocki reported a weakness in the signal subsystem&#39;s
permission checks.  A parent process can choose an arbitary signal
for a child process to send when it exits, but if the parent has
executed a new program then the default SIGCHLD signal is sent.  A
local user permitted to run a program for several days could
bypass this check, execute a setuid program, and then send an
arbitrary signal to it.  Depending on the setuid programs
installed, this could have some security impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-13143&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kyungtae Kim reported a potential heap out-of-bounds write in
the USB gadget subsystem.  A local user permitted to write to
the gadget configuration filesystem could use this to cause a
denial of service (crash or memory corruption) or potentially
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-234-1 mysql-connector-java security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-234-1-mysql-connector-java/</link>
      <pubDate>Mon, 08 Jun 2020 10:16:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-234-1-mysql-connector-java/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-234-1-mysql-connector-java/">
      
&lt;p&gt;Package : mysql-connector-java&lt;/p&gt;


&lt;p&gt;Version : 5.1.49-0&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2875&#34;&gt;CVE-2020-2875&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2933&#34;&gt;CVE-2020-2933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2934&#34;&gt;CVE-2020-2934&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues were discovered in mysql-connector-java that allow
attackers to update, insert or delete access to some of MySQL
Connectors accessible data, unauthorized read access to a subset of
the data, and partial denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-233-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-233-1-openjdk-7/</link>
      <pubDate>Mon, 08 Jun 2020 00:26:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-233-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-233-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u261-2.6.22-1~deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12399&#34;&gt;CVE-2020-12399&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The embedded static NSS library, which is required to build the SunEC security
provider, was affected by a vulnerability in the way NSS generated DSA
signatures. A man-in-the-middle attacker could use this flaw during DSA
signature generation to recover the private key. Erring on the side of caution,
OpenJDK 7 was rebuilt against the latest version of NSS in Wheezy which
provides a solution for this problem.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-232-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-232-1-nss/</link>
      <pubDate>Sun, 07 Jun 2020 15:19:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-232-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-232-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu7u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-12399&#34;&gt;CVE-2020-12399&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A timing attack was found in the way NSS generated DSA signatures. A
man-in-the-middle attacker could use this flaw during DSA signature generation
to recover the private key.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-231-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-231-1-php5/</link>
      <pubDate>Sun, 31 May 2020 11:27:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-231-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-231-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u30&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11048&#34;&gt;CVE-2019-11048&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;When using overly long filenames or field names, a memory limit could
be hit which results in stopping the upload but not cleaning up behind.
This could lead to exhausted disk space on the server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-230-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-230-1-bind9/</link>
      <pubDate>Sat, 30 May 2020 22:39:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-230-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-230-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.8.4.dfsg.P1-6&amp;#43;nmu2&amp;#43;deb7u24&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8616&#34;&gt;CVE-2020-8616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-8617&#34;&gt;CVE-2020-8617&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in BIND, a DNS server implementation.&lt;/p&gt;
&lt;p&gt;CVE-2020-8616&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that BIND does not sufficiently limit the number
of fetches performed when processing referrals. An attacker can take
advantage of this flaw to cause a denial of service (performance
degradation) or use the recursing server in a reflection attack with
a high amplification factor.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2020-8617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a logic error in the code which checks TSIG
validity can be used to trigger an assertion failure, resulting in
denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-229-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-229-1-tomcat7/</link>
      <pubDate>Sun, 24 May 2020 16:21:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-229-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-229-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u25&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-9484&#34;&gt;CVE-2020-9484&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential remote code execution via
deserialization of local files on the filesystem within &lt;code&gt;tomcat7&lt;/code&gt;, a server for
HTTP and Java &amp;ldquo;servlets&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-228-1 apt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-228-1-apt/</link>
      <pubDate>Thu, 14 May 2020 23:27:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-228-1-apt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-228-1-apt/">
      
&lt;p&gt;Package : apt&lt;/p&gt;


&lt;p&gt;Version : 0.9.7.9&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-3810&#34;&gt;CVE-2020-3810&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Shuaibing Lu discovered that missing input validation in the ar/tar
implementations of APT, the high level package manager, could result in
denial of service when processing specially crafted deb files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-227-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-227-1-php5/</link>
      <pubDate>Thu, 30 Apr 2020 16:23:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-227-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-227-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u29&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18218&#34;&gt;CVE-2019-18218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7064&#34;&gt;CVE-2020-7064&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7066&#34;&gt;CVE-2020-7066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7067&#34;&gt;CVE-2020-7067&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Four issues have been found in php5, a server-side, HTML-embedded scripting language.&lt;/p&gt;
&lt;p&gt;CVE-2020-7064
A one byte out-of-bounds read, which could potentially lead to
information disclosure or crash.&lt;/p&gt;
&lt;p&gt;CVE-2020-7066
An URL containing zero (\0) character will be truncated at it, which
may cause some software to make incorrect assumptions and possibly
send some information to a wrong server.&lt;/p&gt;
&lt;p&gt;CVE-2020-7067
Using a malformed url-encoded string an Out-of-Bounds read can occur.&lt;/p&gt;
&lt;p&gt;CVE-2019-18218
Fix to restrict the number of CDF_VECTOR elements to prevent
a heap-based buffer overflow (4-byte out-of-bounds write).
(originally this CVE was filed against package &amp;ldquo;file&amp;rdquo; but
php5 contains an embedded version of that package)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-224-2 ntp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-224-2-ntp/</link>
      <pubDate>Thu, 30 Apr 2020 11:49:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-224-2-ntp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-224-2-ntp/">
      
&lt;p&gt;Package : ntp&lt;/p&gt;


&lt;p&gt;Version : 1:4.2.6.p5&amp;#43;dfsg-2&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11868&#34;&gt;CVE-2020-11868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A Denial of Service (DoS) vulnerability was discovered in the network time
protocol server/client, ntp.&lt;/p&gt;
&lt;p&gt;ntp allowed an &amp;ldquo;off-path&amp;rdquo; attacker to block unauthenticated synchronisation via
a server mode packet with a spoofed source IP address because transmissions
were rescheduled even if a packet lacked a valid &amp;ldquo;origin timestamp&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;Whilst this was initially addressed in version &lt;code&gt;1:4.2.6.p5+dfsg-2+deb7u8&lt;/code&gt;,
lhis update adds further protection that was not present before.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-226-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-226-1-openjdk-7/</link>
      <pubDate>Wed, 29 Apr 2020 12:51:00 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-226-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-226-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u261-2.6.22-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2756&#34;&gt;CVE-2020-2756&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2757&#34;&gt;CVE-2020-2757&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2773&#34;&gt;CVE-2020-2773&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2781&#34;&gt;CVE-2020-2781&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2800&#34;&gt;CVE-2020-2800&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2803&#34;&gt;CVE-2020-2803&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2805&#34;&gt;CVE-2020-2805&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2830&#34;&gt;CVE-2020-2830&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java
runtime, resulting in denial of service, insecure TLS handshakes, bypass
of sandbox restrictions or HTTP response splitting attacks.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-225-1 dom4j security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-225-1-dom4j/</link>
      <pubDate>Thu, 23 Apr 2020 16:29:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-225-1-dom4j/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-225-1-dom4j/">
      
&lt;p&gt;Package : dom4j&lt;/p&gt;


&lt;p&gt;Version : 1.6.1&amp;#43;dfsg.3-2&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-10683&#34;&gt;CVE-2020-10683&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An XML external external entity vulnerability was discovered in dom4j, a
library for working with XML, XPath and XSLT formats on the Java platform.&lt;/p&gt;
&lt;p&gt;This type of attack occurs when XML input containing a reference to an external
entity is processed by a weakly configured XML parser. This attack may lead to
the disclosure of confidential data, denial of service, server side request
forgery, port scanning from the perspective of the machine where the parser is
located as well as other system impacts.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-224-1 ntp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-224-1-ntp/</link>
      <pubDate>Thu, 23 Apr 2020 11:28:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-224-1-ntp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-224-1-ntp/">
      
&lt;p&gt;Package : ntp&lt;/p&gt;


&lt;p&gt;Version : 1:4.2.6.p5&amp;#43;dfsg-2&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-11868&#34;&gt;CVE-2020-11868&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A Denial of Service (DoS) vulnerability was discovered in the network time
protocol server/client, ntp.&lt;/p&gt;
&lt;p&gt;ntp allowed an &amp;ldquo;off-path&amp;rdquo; attacker to block unauthenticated synchronisation via
a server mode packet with a spoofed source IP address because transmissions
were rescheduled even if a packet lacked a valid &amp;ldquo;origin timestamp&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-223-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-223-1-git/</link>
      <pubDate>Wed, 15 Apr 2020 16:10:14 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-223-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-223-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:1.7.10.4-1&amp;#43;wheezy9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-5260&#34;&gt;CVE-2020-5260&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Felix Wilhelm of Google Project Zero discovered a flaw in git, a fast,
scalable, distributed revision control system. With a crafted URL that
contains a newline, the credential helper machinery can be fooled to
return credential information for a wrong host.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-222-1 zlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-222-1-zlib/</link>
      <pubDate>Tue, 14 Apr 2020 22:09:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-222-1-zlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-222-1-zlib/">
      
&lt;p&gt;Package : zlib&lt;/p&gt;


&lt;p&gt;Version : 1:1.2.7.dfsg-13&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-9485&#34;&gt;CVE-2014-9485&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jakub Wilk discovered that miniunzip in zlib-bin was affected by a directory
traversal security vulnerability. An attacker could use this flaw to extract
the contents of a specially crafted zip file to arbitrary locations.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-221-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-221-1-nss/</link>
      <pubDate>Mon, 30 Mar 2020 16:13:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-221-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-221-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu7u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17006&#34;&gt;CVE-2019-17006&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in package nss, which consists of a couple of Network Security Service libraries.
Certain cryptographic primitives in nss did not check the length of the input text. This could result in a potential heap-based buffer overflow.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-220-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-220-1-php5/</link>
      <pubDate>Fri, 27 Mar 2020 17:01:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-220-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-220-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u28&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7062&#34;&gt;CVE-2020-7062&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7063&#34;&gt;CVE-2020-7063&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security issues have been identified and fixed in php5, a
server-side, HTML-embedded scripting language.&lt;/p&gt;
&lt;p&gt;CVE-2020-7062 is about a possible null pointer derefernce, which would
likely lead to a crash, during a failed upload with progress tracking.
CVE-2020-7063 is about wrong file permissions of files added to tar with
Phar::buildFromIterator when extracting them again.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-219-1 libbsd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-219-1-libbsd/</link>
      <pubDate>Thu, 26 Mar 2020 13:26:23 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-219-1-libbsd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-219-1-libbsd/">
      
&lt;p&gt;Package : libbsd&lt;/p&gt;


&lt;p&gt;Version : 0.4.2-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20367&#34;&gt;CVE-2019-20367&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An out-of-bounds read vulnerability during string comparisons was discovered in
&lt;code&gt;libbsd&lt;/code&gt;, a library of functions commonly available on BSD systems but not on
others such as GNU.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-218-1 e2fsprogs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-218-1-e2fsprogs/</link>
      <pubDate>Tue, 24 Mar 2020 19:46:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-218-1-e2fsprogs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-218-1-e2fsprogs/">
      
&lt;p&gt;Package : e2fsprogs&lt;/p&gt;


&lt;p&gt;Version : 1.42.5-1.1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5188&#34;&gt;CVE-2019-5188&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in e2fsprogs, a package that contains ext2/ext3/ext4 file system utilities.
A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-217-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-217-1-tomcat7/</link>
      <pubDate>Mon, 09 Mar 2020 11:16:49 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-217-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-217-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u24&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-1935&#34;&gt;CVE-2020-1935&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The HTTP header parsing code used an approach to end-of-line (EOL)
parsing that allowed some invalid HTTP headers to be parsed as
valid. This led to a possibility of HTTP Request Smuggling if Tomcat
was located behind a reverse proxy that incorrectly handled the
invalid Transfer-Encoding header in a particular manner.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-215-2 openjdk-7 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-215-2-openjdk-7/</link>
      <pubDate>Thu, 05 Mar 2020 20:21:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-215-2-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-215-2-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u251-2.6.21-1~deb7u2&lt;/p&gt;


      &lt;p&gt;The latest security update of openjdk-7 caused a regression by disabling
the build of the SunEC provider. This has been fixed in this version by
re-enabling the build of SunEC.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-216-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-216-1-php5/</link>
      <pubDate>Sat, 29 Feb 2020 19:47:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-216-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-216-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;



&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7059&#34;&gt;CVE-2020-7059&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7060&#34;&gt;CVE-2020-7060&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in php5, a server-side, HTML-embedded scripting language. Both issues are related to crafted data that could lead to reading after an allocated buffer and result in information disclosure or crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-215-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-215-1-openjdk-7/</link>
      <pubDate>Sat, 29 Feb 2020 13:20:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-215-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-215-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u251-2.6.21-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2583&#34;&gt;CVE-2020-2583&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2590&#34;&gt;CVE-2020-2590&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2593&#34;&gt;CVE-2020-2593&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2601&#34;&gt;CVE-2020-2601&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2604&#34;&gt;CVE-2020-2604&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2654&#34;&gt;CVE-2020-2654&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-2659&#34;&gt;CVE-2020-2659&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the OpenJDK Java runtime,
resulting in denial of service, incorrect implementation of Kerberos
GSSAPI and TGS requests or incorrect TLS handshakes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-214-1 netty security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-214-1-netty/</link>
      <pubDate>Wed, 19 Feb 2020 18:24:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-214-1-netty/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-214-1-netty/">
      
&lt;p&gt;Package : netty&lt;/p&gt;


&lt;p&gt;Version : 3.2.6.Final-2&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20444&#34;&gt;CVE-2019-20444&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-20445&#34;&gt;CVE-2019-20445&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2020-7238&#34;&gt;CVE-2020-7238&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the HTTP server provided by
Netty, a Java NIO client/server socket framework:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-20444&lt;/p&gt;
&lt;p&gt;HttpObjectDecoder.java allows an HTTP header that lacks a colon,
which might be interpreted as a separate header with an incorrect
syntax, or might be interpreted as an &amp;ldquo;invalid fold.&amp;rdquo;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-20445&lt;/p&gt;
&lt;p&gt;HttpObjectDecoder.java allows a Content-Length header to be
accompanied by a second Content-Length header, or by a
Transfer-Encoding header.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2020-7238&lt;/p&gt;
&lt;p&gt;Netty allows HTTP Request Smuggling because it mishandles
Transfer-Encoding whitespace (such as a
[space]Transfer-Encoding:chunked line) and a later Content-Length
header.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-213-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-213-1-sudo/</link>
      <pubDate>Thu, 06 Feb 2020 21:57:09 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-213-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-213-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.5p2-1&amp;#43;nmu3&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18634&#34;&gt;CVE-2019-18634&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A privilege escalation vulnerability was discovered in sudo, a tool to allow
users to run programs with the security privileges of another user.&lt;/p&gt;
&lt;p&gt;If &lt;code&gt;pwfeedback&lt;/code&gt; was enabled in &lt;code&gt;/etc/sudoers&lt;/code&gt;, users could trigger a
stack-based buffer overflow in the privileged sudo process.&lt;/p&gt;
&lt;p&gt;Note that whilst &lt;code&gt;pwfeedback&lt;/code&gt; is a default setting in some distributions (eg.
&lt;em&gt;Linux Mint&lt;/em&gt; and &lt;em&gt;elementary OS&lt;/em&gt;) it is not the upstream default and thus
should only exist if enabled by an administrator.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-208-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-208-1-tomcat7/</link>
      <pubDate>Tue, 04 Feb 2020 00:07:55 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-208-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-208-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u23&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12418&#34;&gt;CVE-2019-12418&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17563&#34;&gt;CVE-2019-17563&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities have been found in the Tomcat
servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;CVE-2019-12418&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When Apache Tomcat is configured with the JMX Remote Lifecycle Listener, a
local attacker without access to the Tomcat process or configuration files is
able to manipulate the RMI registry to perform a man-in-the-middle attack to
capture user names and passwords used to access the JMX interface. The attacker
can then use these credentials to access the JMX interface and gain complete
control over the Tomcat instance.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17563&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When using FORM authentication with Apache Tomcat there was a narrow window
where an attacker could perform a session fixation attack. The window was
considered too narrow for an exploit to be practical but, erring on the side of
caution, this issue has been treated as a security vulnerability.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-212-1 zlib security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-212-1-zlib/</link>
      <pubDate>Thu, 30 Jan 2020 14:14:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-212-1-zlib/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-212-1-zlib/">
      
&lt;p&gt;Package : zlib&lt;/p&gt;


&lt;p&gt;Version : 1.2.7.dfsg-13&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9840&#34;&gt;CVE-2016-9840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9841&#34;&gt;CVE-2016-9841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9842&#34;&gt;CVE-2016-9842&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9843&#34;&gt;CVE-2016-9843&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in zlib, a compression library.
They are basically about improper big-endian CRC calculation, improper
left shift of negative integers and improper pointer arithmetic.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-211-1 wget security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-211-1-wget/</link>
      <pubDate>Thu, 30 Jan 2020 13:58:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-211-1-wget/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-211-1-wget/">
      
&lt;p&gt;Package : wget&lt;/p&gt;



&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-7098&#34;&gt;CVE-2016-7098&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in wget, a tool to retrieve files from the web.
A race condition might occur as files rejected by an access list are kept
on the disk for the duration of a HTTP connection.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-210-1 unzip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-210-1-unzip/</link>
      <pubDate>Tue, 28 Jan 2020 20:03:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-210-1-unzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-210-1-unzip/">
      
&lt;p&gt;Package : unzip&lt;/p&gt;


&lt;p&gt;Version : 6.0-8&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000035&#34;&gt;CVE-2018-1000035&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in unzip, a de-archiver for .zip files.
While processing a password protected archive, a heap-based buffer overflow could happen, that allows an attacker to perform a denial of service or to possibly achieve code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-209-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-209-1-linux/</link>
      <pubDate>Mon, 27 Jan 2020 00:07:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-209-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-209-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.81-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2215&#34;&gt;CVE-2019-2215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10220&#34;&gt;CVE-2019-10220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14895&#34;&gt;CVE-2019-14895&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14896&#34;&gt;CVE-2019-14896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14897&#34;&gt;CVE-2019-14897&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14901&#34;&gt;CVE-2019-14901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15098&#34;&gt;CVE-2019-15098&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15217&#34;&gt;CVE-2019-15217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15291&#34;&gt;CVE-2019-15291&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15505&#34;&gt;CVE-2019-15505&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16746&#34;&gt;CVE-2019-16746&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17052&#34;&gt;CVE-2019-17052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17053&#34;&gt;CVE-2019-17053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17054&#34;&gt;CVE-2019-17054&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17055&#34;&gt;CVE-2019-17055&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17056&#34;&gt;CVE-2019-17056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17133&#34;&gt;CVE-2019-17133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17666&#34;&gt;CVE-2019-17666&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19051&#34;&gt;CVE-2019-19051&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19052&#34;&gt;CVE-2019-19052&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19056&#34;&gt;CVE-2019-19056&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19057&#34;&gt;CVE-2019-19057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19062&#34;&gt;CVE-2019-19062&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19066&#34;&gt;CVE-2019-19066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19227&#34;&gt;CVE-2019-19227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19332&#34;&gt;CVE-2019-19332&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19523&#34;&gt;CVE-2019-19523&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19524&#34;&gt;CVE-2019-19524&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19527&#34;&gt;CVE-2019-19527&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19530&#34;&gt;CVE-2019-19530&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19531&#34;&gt;CVE-2019-19531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19532&#34;&gt;CVE-2019-19532&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19533&#34;&gt;CVE-2019-19533&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19534&#34;&gt;CVE-2019-19534&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19536&#34;&gt;CVE-2019-19536&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19537&#34;&gt;CVE-2019-19537&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19767&#34;&gt;CVE-2019-19767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19922&#34;&gt;CVE-2019-19922&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19947&#34;&gt;CVE-2019-19947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19965&#34;&gt;CVE-2019-19965&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19966&#34;&gt;CVE-2019-19966&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, or information
leak.&lt;/p&gt;
&lt;p&gt;CVE-2019-2215&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a use-after-free vulnerability in
the Android binder driver.  A local user on a system with this
driver enabled could use this to cause a denial of service (memory
corruption or crash) or possibly for privilege escalation.
However, this driver is not enabled on Debian packaged kernels.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Various developers and researchers found that if a crafted file-
system or malicious file server presented a directory with
filenames including a &#39;/&#39; character, this could confuse and
possibly defeat security checks in applications that read the
directory.

The kernel will now return an error when reading such a directory,
rather than passing the invalid filenames on to user-space.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14895, CVE-2019-14901&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ADLab of Venustech discovered potential heap buffer overflows in
the mwifiex wifi driver.  On systems using this driver, a
malicious Wireless Access Point or adhoc/P2P peer could use these
to cause a denial of service (memory corruption or crash) or
possibly for remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14896, CVE-2019-14897&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ADLab of Venustech discovered potential heap and stack buffer
overflows in the libertas wifi driver.  On systems using this
driver, a malicious Wireless Access Point or adhoc/P2P peer could
use these to cause a denial of service (memory corruption or
crash) or possibly for remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15098&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hui Peng and Mathias Payer reported that the ath6kl wifi driver
did not properly validate USB descriptors, which could lead to a
null pointer derefernce.  An attacker able to add USB devices
could use this to cause a denial of service (BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15217&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that the zr364xx mdia driver did not
correctly handle devices without a product name string, which
could lead to a null pointer dereference.  An attacker able to add
USB devices could use this to cause a denial of service
(BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15291&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that the b2c2-flexcop-usb media
driver did not properly validate USB descriptors, which could lead
to a null pointer dereference.  An attacker able to add USB
devices could use this to cause a denial of service (BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15505&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that the technisat-usb2 media driver
did not properly validate incoming IR packets, which could lead to
a heap buffer over-read.  An attacker able to add USB devices
could use this to cause a denial of service (BUG/oops) or to read
sensitive information from kernel memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-16746&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the wifi stack did not validate the content
of beacon heads provided by user-space for use on a wifi interface
in Access Point mode, which could lead to a heap buffer overflow.
A local user permitted to configure a wifi interface could use
this to cause a denial of service (memory corruption or crash) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17052, CVE-2019-17053, CVE-2019-17054, CVE-2019-17055,
CVE-2019-17056&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Ori Nimron reported that various network protocol implementations
- AX.25, IEEE 802.15.4, Appletalk, ISDN, and NFC - allowed all
users to create raw sockets.  A local user could use this to send
arbitrary packets on networks using those protocols.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17133&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Nicholas Waisman reported that the wifi stack did not valdiate
received SSID information before copying it, which could lead to a
buffer overflow if it is not validated by the driver or firmware.
A malicious Wireless Access Point might be able to use this to
cause a denial of service (memory corruption or crash) or for
remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-17666&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Nicholas Waisman reported that the rtlwifi wifi drivers did not
properly validate received P2P information, leading to a buffer
overflow.  A malicious P2P peer could use this to cause a denial
of service (memory corruption or crash) or for remote code
execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19051&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Navid Emamdoost discovered a potential memory leak in the i2400m
wimax driver if the software rfkill operation fails.  The security
impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19052&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Navid Emamdoost discovered a potential memory leak in the gs_usb
CAN driver if the open (interface-up) operation fails.  The
security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19056, CVE-2019-19057&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Navid Emamdoost discovered potential memory leaks in the mwifiex
wifi driver if the probe operation fails.  The security impact of
this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19062&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Navid Emamdoost discovered a potential memory leak in the AF_ALG
subsystem if the CRYPTO_MSG_GETALG operation fails.  A local user
could possibly use this to cause a denial of service (memory
exhaustion).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19066&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Navid Emamdoost discovered a potential memory leak in the bfa SCSI
driver if the get_fc_host_stats operation fails.  The security
impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19227&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dan Carpenter reported missing error checks in the Appletalk
protocol implementation that could lead to a null pointer
dereference.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19332&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a missing bounds check in the KVM
implementation for x86, which could lead to a heap buffer overflow.
A local user permitted to use KVM could use this to cause a denial
of service (memory corruption or crash) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19523&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a use-after-free bug in the adutux
USB driver.  An attacker able to add and remove USB devices could
use this to cause a denial of service (memory corruption or crash)
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19524&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a race condition in the ff-memless
library used by input drivers.  An attacker able to add and remove
USB devices could use this to cause a denial of service (memory
corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19527&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that the hiddev driver did not
correctly handle races between a task opening the device and
disconnection of the underlying hardware.  A local user permitted
to access hiddev devices, and able to add and remove USB devices,
could use this to cause a denial of service (memory corruption or
crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19530&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a potential use-after-free in the
cdc-acm network driver.  An attacker able to add USB devices could
use this to cause a denial of service (memory corruption or crash)
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19531&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a use-after-free bug in the yurex
USB driver.  An attacker able to add and remove USB devices could
use this to cause a denial of service (memory corruption or crash)
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19532&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a potential heap buffer overflow in
the hid-gaff input driver, which was also found to exist in many
other input drivers.  An attacker able to add USB devices could
use this to cause a denial of service (memory corruption or crash)
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19533&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that the ttusb-dec media driver was
missing initialisation of a structure, which could leak sensitive
information from kernel memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19534, CVE-2019-19536&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that the peak_usb CAN driver was
missing initialisation of some structures, which could leak
sensitive information from kernel memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19537&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered race conditions in the USB stack,
involving character device registration.  An attacker able to add
USB devices could use this to cause a denial of service (memory
corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19767&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered that crafted ext4 volumes could
trigger a buffer overflow in the ext4 filesystem driver.  An
attacker able to mount such a volume could use this to cause a
denial of service (memory corruption or crash) or possibly for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19922&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that a change in Linux 3.16.61, &amp;quot;sched/fair: Fix
bandwidth timer clock drift condition&amp;quot;, could lead to tasks being
throttled before using their full quota of CPU time.  A local
user could use this bug to slow down other users&#39; tasks.  This
change has been reverted.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19947&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the kvaser_usb CAN driver was missing
initialisation of some structures, which could leak sensitive
information from kernel memory.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19965&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gao Chuan reported a race condition in the libsas library used by
SCSI host drivers, which could lead to a null pointer dereference.
An attacker able to add and remove SCSI devices could use this to
cause a denial of service (BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-19966&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool discovered a missing error check in the cpia2
media driver, which could lead to a use-after-free.  An attacker
able to add USB devices could use this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-207-1 jsoup security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-207-1-jsoup/</link>
      <pubDate>Sun, 26 Jan 2020 19:51:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-207-1-jsoup/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-207-1-jsoup/">
      
&lt;p&gt;Package : jsoup&lt;/p&gt;


&lt;p&gt;Version : 1.6.2-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-6748&#34;&gt;CVE-2015-6748&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in jsoup, a Java HTML parser that makes sense of real-world HTML soup.
Due to bad handling of missing &amp;lsquo;&amp;gt;&amp;rsquo; at EOF a cross-site scripting (XSS) vulnerability could appear.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-206-1 apache-log4j1.2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-206-1-apache-log4j1.2/</link>
      <pubDate>Sat, 11 Jan 2020 18:26:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-206-1-apache-log4j1.2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-206-1-apache-log4j1.2/">
      
&lt;p&gt;Package : apache-log4j1.2&lt;/p&gt;


&lt;p&gt;Version : 1.2.16-3&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17571&#34;&gt;CVE-2019-17571&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Included in Log4j 1.2, a logging library for Java, is a SocketServer class that
is vulnerable to deserialization of untrusted data which can be exploited to
remotely execute arbitrary code when combined with a deserialization gadget
when listening to untrusted network traffic for log data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-205-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-205-1-git/</link>
      <pubDate>Tue, 07 Jan 2020 00:06:07 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-205-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-205-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:1.7.10.4-1&amp;#43;wheezy8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1348&#34;&gt;CVE-2019-1348&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1349&#34;&gt;CVE-2019-1349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1387&#34;&gt;CVE-2019-1387&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in git, a fast, scalable,
distributed revision control system.&lt;/p&gt;
&lt;p&gt;CVE-2019-1348&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was reported that the --export-marks option of git fast-import is
exposed also via the in-stream command feature export-marks=...,
allowing to overwrite arbitrary paths.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-1387&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that submodule names are not validated strictly
enough, allowing very targeted attacks via remote code execution
when performing recursive clones.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-204-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-204-1-php5/</link>
      <pubDate>Mon, 30 Dec 2019 16:47:34 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-204-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-204-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u26&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11045&#34;&gt;CVE-2019-11045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11046&#34;&gt;CVE-2019-11046&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11047&#34;&gt;CVE-2019-11047&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11050&#34;&gt;CVE-2019-11050&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security bugs have been identified and fixed in php5, a server-side, HTML-embedded scripting language.
The affected components include the exif module and handling of filenames with \0 embedded.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-200-2 intel-microcode regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-200-2-intel-microcode/</link>
      <pubDate>Sat, 28 Dec 2019 17:21:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-200-2-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-200-2-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20191115.2~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11135&#34;&gt;CVE-2019-11135&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11139&#34;&gt;CVE-2019-11139&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop) models
of Intel CPUs which were not yet included in the Intel microcode update
released as ELA-200-1. For details please refer to&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf&#34;&gt;https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/IPU-2019.2-microcode-update-guidance-v1.01.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Additionally this update rolls back CPU microcode for HEDT and Xeon processors
with signature 0x50654 which were affected by a regression causing hangs on
warm reboots (Cf. #946515).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-203-1 cyrus-sasl2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-203-1-cyrus-sasl2/</link>
      <pubDate>Fri, 20 Dec 2019 14:28:56 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-203-1-cyrus-sasl2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-203-1-cyrus-sasl2/">
      
&lt;p&gt;Package : cyrus-sasl2&lt;/p&gt;


&lt;p&gt;Version : 2.1.25.dfsg1-6&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19906&#34;&gt;CVE-2019-19906&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;There has been an out-of-bounds write in Cyrus SASL leading to
unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP
packet. The OpenLDAP crash was ultimately caused by an off-by-one error
in _sasl_add_string in common.c in cyrus-sasl.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-202-2 gdk-pixbuf regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-202-2-gdk-pixbuf/</link>
      <pubDate>Fri, 20 Dec 2019 12:59:37 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-202-2-gdk-pixbuf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-202-2-gdk-pixbuf/">
      
&lt;p&gt;Package : gdk-pixbuf&lt;/p&gt;


&lt;p&gt;Version : 2.26.1-1&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-6314&#34;&gt;CVE-2017-6314&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;While preparing a fix for CVE-2017-6314 an unknown symbol g_uint_checked_mul() was introduced.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-202-1 gdk-pixbuf security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-202-1-gdk-pixbuf/</link>
      <pubDate>Thu, 19 Dec 2019 19:27:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-202-1-gdk-pixbuf/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-202-1-gdk-pixbuf/">
      
&lt;p&gt;Package : gdk-pixbuf&lt;/p&gt;


&lt;p&gt;Version : 2.26.1-1&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-6352&#34;&gt;CVE-2016-6352&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-2870&#34;&gt;CVE-2017-2870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-6312&#34;&gt;CVE-2017-6312&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-6313&#34;&gt;CVE-2017-6313&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-6314&#34;&gt;CVE-2017-6314&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues in gdk-pixbuf, a library to handle pixbuf, have been found.&lt;/p&gt;
&lt;p&gt;CVE-2016-6352
fix for denial of service (out-of-bounds write and crash) via
crafted dimensions in an ICO file&lt;/p&gt;
&lt;p&gt;CVE-2017-2870
Fix for an exploitable integer overflow vulnerability in the
tiff_image_parse functionality. When software is compiled with
clang, A specially crafted tiff file can cause a heap-overflow
resulting in remote code execution. Debian package is compiled
with gcc and is not affected, but probably some downstream is.&lt;/p&gt;
&lt;p&gt;CVE-2017-6312
Fix for an integer overflow in io-ico.c that allows attackers
to cause a denial of service (segmentation fault and application
crash) via a crafted image&lt;/p&gt;
&lt;p&gt;CVE-2017-6313
Fix for an integer underflow in the load_resources function in
io-icns.c that allows attackers to cause a denial of service
(out-of-bounds read and program crash) via a crafted image entry
size in an ICO file&lt;/p&gt;
&lt;p&gt;CVE-2017-6314
Fix for an infinite loop in the make_available_at_least function
in io-tiff.c that allows attackers to cause a denial of service
via a large TIFF file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-201-1 ruby1.9.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-201-1-ruby1.9.1/</link>
      <pubDate>Wed, 18 Dec 2019 18:33:28 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-201-1-ruby1.9.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-201-1-ruby1.9.1/">
      
&lt;p&gt;Package : ruby1.9.1&lt;/p&gt;


&lt;p&gt;Version : 1.9.3.194-8.1&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15845&#34;&gt;CVE-2019-15845&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16201&#34;&gt;CVE-2019-16201&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16254&#34;&gt;CVE-2019-16254&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16255&#34;&gt;CVE-2019-16255&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the interpreter for
the Ruby language, which could result in unauthorized access by
bypassing intended path matchings, denial of service, or the execution
of arbitrary code.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-16255&lt;/p&gt;
&lt;p&gt;Ruby allows code injection if the first argument (aka the
&amp;ldquo;command&amp;rdquo; argument) to Shell#[] or Shell#test in lib/shell.rb is
untrusted data. An attacker can exploit this to call an arbitrary
Ruby method.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-15845&lt;/p&gt;
&lt;p&gt;Ruby mishandles path checking within File.fnmatch functions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-16254&lt;/p&gt;
&lt;p&gt;Ruby allows HTTP Response Splitting. If a program using WEBrick
inserts untrusted input into the response header, an attacker can
exploit it to insert a newline character to split a header, and
inject malicious content to deceive clients. NOTE: this issue
exists because of an incomplete fix for CVE-2017-17742, which
addressed the CRLF vector, but did not address an isolated CR or
an isolated LF.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-16201&lt;/p&gt;
&lt;p&gt;WEBrick::HTTPAuth::DigestAuth in Ruby has a regular expression
Denial of Service cause by looping/backtracking. A victim must
expose a WEBrick server that uses DigestAuth to the Internet or a
untrusted network.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-199-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-199-1-openjdk-7/</link>
      <pubDate>Wed, 11 Dec 2019 01:23:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-199-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-199-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u241-2.6.20-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2894&#34;&gt;CVE-2019-2894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2933&#34;&gt;CVE-2019-2933&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2945&#34;&gt;CVE-2019-2945&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2949&#34;&gt;CVE-2019-2949&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2958&#34;&gt;CVE-2019-2958&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2962&#34;&gt;CVE-2019-2962&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2964&#34;&gt;CVE-2019-2964&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2973&#34;&gt;CVE-2019-2973&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2978&#34;&gt;CVE-2019-2978&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2981&#34;&gt;CVE-2019-2981&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2983&#34;&gt;CVE-2019-2983&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2987&#34;&gt;CVE-2019-2987&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2988&#34;&gt;CVE-2019-2988&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2989&#34;&gt;CVE-2019-2989&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2992&#34;&gt;CVE-2019-2992&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2999&#34;&gt;CVE-2019-2999&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, information disclosure or the execution
of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-200-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-200-1-intel-microcode/</link>
      <pubDate>Wed, 11 Dec 2019 01:23:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-200-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-200-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20191112.1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11135&#34;&gt;CVE-2019-11135&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11139&#34;&gt;CVE-2019-11139&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for some types of Intel CPUs. In
particular it provides mitigations for the TAA (TSX Asynchronous Abort)
vulnerability. For affected CPUs, to fully mitigate the vulnerability it
is also necessary to update the Linux kernel packages as released in ELA-190-1.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-198-1 libonig security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-198-1-libonig/</link>
      <pubDate>Wed, 04 Dec 2019 10:54:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-198-1-libonig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-198-1-libonig/">
      
&lt;p&gt;Package : libonig&lt;/p&gt;


&lt;p&gt;Version : 5.9.1-1&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19012&#34;&gt;CVE-2019-19012&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19204&#34;&gt;CVE-2019-19204&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-19246&#34;&gt;CVE-2019-19246&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in the Oniguruma regular
expressions library, notably used in PHP mbstring.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-19012&lt;/p&gt;
&lt;p&gt;An integer overflow in the search_in_range function in regexec.c
leads to an out-of-bounds read, in which the offset of this read
is under the control of an attacker. (This only affects the 32-bit
compiled version). Remote attackers can cause a denial-of-service
or information disclosure, or possibly have unspecified other
impact, via a crafted regular expression.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-19204&lt;/p&gt;
&lt;p&gt;In the function fetch_range_quantifier in regparse.c, PFETCH is
called without checking PEND. This leads to a heap-based buffer
over-read and lead to denial-of-service via a crafted regular
expression.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-19246&lt;/p&gt;
&lt;p&gt;Heap-based buffer over-read in str_lower_case_match in regexec.c
can lead to denial-of-service via a crafted regular expression.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-197-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-197-1-nss/</link>
      <pubDate>Fri, 29 Nov 2019 21:36:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-197-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-197-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17007&#34;&gt;CVE-2019-17007&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage()
may have crashed with a NULL deref leading to a Denial-of-Service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-196-1 icu security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-196-1-icu/</link>
      <pubDate>Wed, 27 Nov 2019 22:50:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-196-1-icu/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-196-1-icu/">
      
&lt;p&gt;Package : icu&lt;/p&gt;


&lt;p&gt;Version : 4.8.1.1-12&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14952&#34;&gt;CVE-2017-14952&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in icu, a package containing International Components for Unicode.&lt;/p&gt;
&lt;p&gt;By not doing a double free in createMetazoneMappings() a crash of the application that uses this function can be avoided.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-195-1 libvorbis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-195-1-libvorbis/</link>
      <pubDate>Wed, 27 Nov 2019 22:45:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-195-1-libvorbis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-195-1-libvorbis/">
      
&lt;p&gt;Package : libvorbis&lt;/p&gt;


&lt;p&gt;Version : 1.3.2-1.3&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14160&#34;&gt;CVE-2017-14160&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10392&#34;&gt;CVE-2018-10392&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10393&#34;&gt;CVE-2018-10393&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been found in libvorbis, a decoder library for Vorbis
General Audio Compression Codec.&lt;/p&gt;
&lt;p&gt;The fix for CVE-2017-14160 and CVE-2018-10393 improve the bound checking
for very low sample rates.&lt;/p&gt;
&lt;p&gt;CVE-2018-10392 was found because the number of channels was not validated
and a remote attacker could cause a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-194-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-194-1-nss/</link>
      <pubDate>Mon, 25 Nov 2019 18:29:59 -0500</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-194-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-194-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11745&#34;&gt;CVE-2019-11745&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been discovered in nss, the Mozilla Network Security
Service library.  An out-of-bounds write can occur when passing an
output buffer smaller than the block size to NSC_EncryptUpdate.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-193-1 libxdmcp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-193-1-libxdmcp/</link>
      <pubDate>Mon, 25 Nov 2019 19:59:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-193-1-libxdmcp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-193-1-libxdmcp/">
      
&lt;p&gt;Package : libxdmcp&lt;/p&gt;


&lt;p&gt;Version : 1:1.1.1-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-2625&#34;&gt;CVE-2017-2625&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It has been found, that libxdmcp, an X11 Display Manager Control Protocol library, uses weak entropy to generate keys.
Using arc4random_buf() from libbsd should avoid this flaw.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-192-1 isc-dhcp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-192-1-isc-dhcp/</link>
      <pubDate>Sat, 23 Nov 2019 22:59:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-192-1-isc-dhcp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-192-1-isc-dhcp/">
      
&lt;p&gt;Package : isc-dhcp&lt;/p&gt;


&lt;p&gt;Version : 4.2.2.dfsg.1-5&amp;#43;deb70u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2774&#34;&gt;CVE-2016-2774&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-3144&#34;&gt;CVE-2017-3144&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in isc-dhcp, a server for automatic IP address assignment.&lt;/p&gt;
&lt;p&gt;CVE-2016-2774
The number of simultaneous open TCP connections to OMAPI port of
the server has to be limited in order to avoid a denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2017-3144
A failure to properly clean up OMAPI connections might result in an
exhaustion of socket descriptors and thus lead to a denial of service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-191-1 libice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-191-1-libice/</link>
      <pubDate>Sat, 23 Nov 2019 19:51:27 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-191-1-libice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-191-1-libice/">
      
&lt;p&gt;Package : libice&lt;/p&gt;


&lt;p&gt;Version : 2:1.0.8-2&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-2626&#34;&gt;CVE-2017-2626&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It has been found, that libice, an X11 Inter-Client Exchange library,
uses weak entropy to generate keys.
Using arc4random_buf() from libbsd should avoid this flaw.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-190-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-190-1-linux/</link>
      <pubDate>Wed, 20 Nov 2019 20:34:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-190-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-190-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.76-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0154&#34;&gt;CVE-2019-0154&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11135&#34;&gt;CVE-2019-11135&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service, or information
leak.&lt;/p&gt;
&lt;p&gt;CVE-2019-0154&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Intel discovered that on their 8th and 9th generation GPUs,
reading certain registers while the GPU is in a low-power state
can cause a system hang.  A local user permitted to use the GPU
can use this for denial of service.

This update mitigates the issue through changes to the i915
driver.

The affected chips (gen8) are listed at
&amp;lt;https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen8&amp;gt;;.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11135&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that on Intel CPUs supporting transactional
memory (TSX), a transaction that is going to be aborted may
continue to execute speculatively, reading sensitive data from
internal buffers and leaking it through dependent operations.
Intel calls this &amp;quot;TSX Asynchronous Abort&amp;quot; (TAA).

For CPUs affected by the previously published Microarchitectural
Data Sampling (MDS) issues (CVE-2018-12126, CVE-2018-12127,
CVE-2018-12130, CVE-2019-11091), the existing mitigation also
mitigates this issue.

For processors that are vulnerable to TAA but not MDS, this update
disables TSX by default. This mitigation requires updated CPU
microcode. An updated intel-microcode package (only available in
Debian non-free) will be provided via a future ELA. The updated
CPU microcode may also be available as part of a system firmware
(&amp;quot;BIOS&amp;quot;) update.

Further information on the mitigation can be found at
&amp;lt;https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html&amp;gt;
or in the linux-doc-3.16 package.

Intel&#39;s explanation of the issue can be found at
&amp;lt;https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort&amp;gt;;.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-189-1 mesa security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-189-1-mesa/</link>
      <pubDate>Fri, 15 Nov 2019 13:29:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-189-1-mesa/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-189-1-mesa/">
      
&lt;p&gt;Package : mesa&lt;/p&gt;


&lt;p&gt;Version : 3.5.25.3-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5068&#34;&gt;CVE-2019-5068&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Tim Brown discovered a shared memory permissions vulnerability in the
Mesa 3D graphics library.  Some Mesa X11 drivers use shared-memory
XImages to implement back buffers for improved performance, but Mesa
creates shared memory regions with permission mode 0777.  An attacker
can access the shared memory without any specific permissions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-188-1 djvulibre security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-188-1-djvulibre/</link>
      <pubDate>Sun, 10 Nov 2019 19:26:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-188-1-djvulibre/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-188-1-djvulibre/">
      
&lt;p&gt;Package : djvulibre&lt;/p&gt;


&lt;p&gt;Version : 3.5.25.3-1&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18804&#34;&gt;CVE-2019-18804&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a NULL pointer dereference issue in the IW44
encoder/decoder within DjVu, a set of compression technologies, a file format,
and a software platform for the delivery over the Web of digital documents.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-187-1 cpio security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-187-1-cpio/</link>
      <pubDate>Wed, 06 Nov 2019 01:47:35 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-187-1-cpio/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-187-1-cpio/">
      
&lt;p&gt;Package : cpio&lt;/p&gt;


&lt;p&gt;Version : 2.11&amp;#43;dfsg-0.1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14866&#34;&gt;CVE-2019-14866&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It is possible for an attacker to create a file so when backed up with cpio
can generate arbitrary files in the resulting tar archive. When the backup is
restored the file is then created with arbitrary permissions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-186-1 libssh2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-186-1-libssh2/</link>
      <pubDate>Mon, 04 Nov 2019 20:40:18 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-186-1-libssh2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-186-1-libssh2/">
      
&lt;p&gt;Package : libssh2&lt;/p&gt;


&lt;p&gt;Version : 1.4.2-1.1&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17498&#34;&gt;CVE-2019-17498&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In libssh2, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in
a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds)
offset for a subsequent memory read. A crafted SSH server may be able to
disclose sensitive information or cause a denial of service condition on the
client system when a user connects to the server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-185-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-185-1-libxslt/</link>
      <pubDate>Sun, 27 Oct 2019 23:33:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-185-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-185-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.26-14.1&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18197&#34;&gt;CVE-2019-18197&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A security vulnerability was discovered in libxslt, a XSLT 1.0
processing library written in C.&lt;/p&gt;
&lt;p&gt;In xsltCopyText in transform.c, a pointer variable is not reset under
certain circumstances. If the relevant memory area happened to be freed
and reused in a certain way, a bounds check could fail and memory
outside a buffer could be written to, or uninitialized data could be
disclosed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-184-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-184-1-libarchive/</link>
      <pubDate>Sun, 27 Oct 2019 12:32:48 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-184-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-184-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.0.4-3&amp;#43;wheezy6&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18408&#34;&gt;CVE-2019-18408&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in libarchive, a multi-format archive and compression library.&lt;/p&gt;
&lt;p&gt;In case of a crafted archive containing several parts and one part being corrupt, there would be an use-after-free for the next part of the archive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-183-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-183-1-php5/</link>
      <pubDate>Sat, 26 Oct 2019 16:53:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-183-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-183-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u25&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11043&#34;&gt;CVE-2019-11043&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Emil Lerner, beched and d90pwn found a buffer underflow in php5-fpm, a
Fast Process Manager for the PHP language, which can lead to remote
code execution.&lt;/p&gt;
&lt;p&gt;Instances are vulnerable depending on the web server configuration, in
particular PATH_INFO handling.  For a full list of preconditions,
check: &lt;a href=&#34;https://github.com/neex/phuip-fpizdam&#34;&gt;https://github.com/neex/phuip-fpizdam&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-182-1 file security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-182-1-file/</link>
      <pubDate>Wed, 23 Oct 2019 19:36:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-182-1-file/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-182-1-file/">
      
&lt;p&gt;Package : file&lt;/p&gt;


&lt;p&gt;Version : 5.11-2&amp;#43;deb7u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-18218&#34;&gt;CVE-2019-18218&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue has been found in file, a tool to determine file types by using magic numbers.&lt;/p&gt;
&lt;p&gt;The number of CDF_VECTOR elements had to be restricted in order to prevent a heap-based buffer overflow (4-byte out-of-bounds write).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-181-1 blktrace security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-181-1-blktrace/</link>
      <pubDate>Wed, 23 Oct 2019 19:23:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-181-1-blktrace/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-181-1-blktrace/">
      
&lt;p&gt;Package : blktrace&lt;/p&gt;


&lt;p&gt;Version : 1.0.1-2.1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10689&#34;&gt;CVE-2018-10689&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue in blktrace, a package containing utilities for block layer IO tracing, has been found.
As some arrays are too small, one could create a buffer overflow in dev_map_read() when using a crafted file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-180-1 aspell security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-180-1-aspell/</link>
      <pubDate>Mon, 21 Oct 2019 23:56:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-180-1-aspell/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-180-1-aspell/">
      
&lt;p&gt;Package : aspell&lt;/p&gt;


&lt;p&gt;Version : 0.60.7~20110707-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17544&#34;&gt;CVE-2019-17544&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;GNU Aspell, a spell-checker, is vulnerable to a stack-based buffer
over-read via an isolated \ character when processing a configuration
file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-179-1 nfs-utils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-179-1-nfs-utils/</link>
      <pubDate>Sat, 19 Oct 2019 16:32:35 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-179-1-nfs-utils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-179-1-nfs-utils/">
      
&lt;p&gt;Package : nfs-utils&lt;/p&gt;


&lt;p&gt;Version : 1.2.6-4&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3689&#34;&gt;CVE-2019-3689&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In the nfs-utils package, providing support files for Network File
System (NFS) including the rpc.statd daemon, the directory
/var/lib/nfs is owned by statd:nogroup.  This directory contains files
owned and managed by root.  If statd is compromised, it can therefore
trick processes running with root privileges into creating/overwriting
files anywhere on the system.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-178-1 sudo security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-178-1-sudo/</link>
      <pubDate>Thu, 17 Oct 2019 21:30:22 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-178-1-sudo/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-178-1-sudo/">
      
&lt;p&gt;Package : sudo&lt;/p&gt;


&lt;p&gt;Version : 1.8.5p2-1&amp;#43;nmu3&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14287&#34;&gt;CVE-2019-14287&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In sudo, a program that provides limited super user privileges to
specific users, an attacker with access to a Runas ALL sudoer account
can bypass certain policy blacklists and session PAM modules, and can
cause incorrect logging, by invoking sudo with a crafted user ID. For
example, this allows bypass of (ALL,!root) configuration for a &amp;ldquo;sudo
-u#-1&amp;rdquo; command.&lt;/p&gt;
&lt;p&gt;See &lt;a href=&#34;https://www.sudo.ws/alerts/minus_1_uid.html&#34;&gt;https://www.sudo.ws/alerts/minus_1_uid.html&lt;/a&gt; for further
information.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-177-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-177-1-libdatetime-timezone-perl/</link>
      <pubDate>Mon, 14 Oct 2019 13:31:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-177-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-177-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.58-1&amp;#43;2019c&lt;/p&gt;


      &lt;p&gt;This update brings the Olson database changes from the 2019c version to
the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-176-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-176-1-tzdata/</link>
      <pubDate>Mon, 14 Oct 2019 13:27:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-176-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-176-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2019c-0&amp;#43;deb7u1&lt;/p&gt;


      &lt;p&gt;This update brings the timezone changes from the upstream 2019c release.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-174-1 tcpdump security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-174-1-tcpdump/</link>
      <pubDate>Fri, 11 Oct 2019 22:19:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-174-1-tcpdump/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-174-1-tcpdump/">
      
&lt;p&gt;Package : tcpdump&lt;/p&gt;


&lt;p&gt;Version : 4.9.3-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10103&#34;&gt;CVE-2018-10103&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10105&#34;&gt;CVE-2018-10105&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14461&#34;&gt;CVE-2018-14461&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14462&#34;&gt;CVE-2018-14462&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14463&#34;&gt;CVE-2018-14463&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14464&#34;&gt;CVE-2018-14464&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14465&#34;&gt;CVE-2018-14465&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14466&#34;&gt;CVE-2018-14466&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14467&#34;&gt;CVE-2018-14467&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14468&#34;&gt;CVE-2018-14468&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14469&#34;&gt;CVE-2018-14469&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14470&#34;&gt;CVE-2018-14470&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14879&#34;&gt;CVE-2018-14879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14880&#34;&gt;CVE-2018-14880&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14881&#34;&gt;CVE-2018-14881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14882&#34;&gt;CVE-2018-14882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16227&#34;&gt;CVE-2018-16227&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16228&#34;&gt;CVE-2018-16228&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16229&#34;&gt;CVE-2018-16229&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16230&#34;&gt;CVE-2018-16230&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16300&#34;&gt;CVE-2018-16300&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16451&#34;&gt;CVE-2018-16451&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16452&#34;&gt;CVE-2018-16452&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15166&#34;&gt;CVE-2019-15166&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in tcpdump, a command-line network
traffic analyzer. These security vulnerabilities might result in denial of
service or, potentially, execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-175-1 rsyslog security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-175-1-rsyslog/</link>
      <pubDate>Fri, 11 Oct 2019 16:22:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-175-1-rsyslog/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-175-1-rsyslog/">
      
&lt;p&gt;Package : rsyslog&lt;/p&gt;


&lt;p&gt;Version : 5.8.11-3&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17041&#34;&gt;CVE-2019-17041&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-17042&#34;&gt;CVE-2019-17042&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two heap overflow vulnerabilities were discovered in rsyslog, a system
and kernel logging daemon, in the AIX and Cisco log messages parsers
(not loaded in the default configuration).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-173-1 libpcap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-173-1-libpcap/</link>
      <pubDate>Thu, 10 Oct 2019 17:15:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-173-1-libpcap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-173-1-libpcap/">
      
&lt;p&gt;Package : libpcap&lt;/p&gt;


&lt;p&gt;Version : 1.3.0-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15165&#34;&gt;CVE-2019-15165&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;libpcap, a system interface for user-level packet capture, does not
properly validate the PHB header length in .pcapng files before
allocating memory.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-172-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-172-1-linux/</link>
      <pubDate>Wed, 02 Oct 2019 18:40:05 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-172-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-172-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.74-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10905&#34;&gt;CVE-2016-10905&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20976&#34;&gt;CVE-2018-20976&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-21008&#34;&gt;CVE-2018-21008&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0136&#34;&gt;CVE-2019-0136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9506&#34;&gt;CVE-2019-9506&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14814&#34;&gt;CVE-2019-14814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14815&#34;&gt;CVE-2019-14815&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14816&#34;&gt;CVE-2019-14816&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14821&#34;&gt;CVE-2019-14821&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14835&#34;&gt;CVE-2019-14835&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15117&#34;&gt;CVE-2019-15117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15118&#34;&gt;CVE-2019-15118&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15211&#34;&gt;CVE-2019-15211&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15212&#34;&gt;CVE-2019-15212&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15215&#34;&gt;CVE-2019-15215&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15218&#34;&gt;CVE-2019-15218&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15219&#34;&gt;CVE-2019-15219&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15220&#34;&gt;CVE-2019-15220&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15221&#34;&gt;CVE-2019-15221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15292&#34;&gt;CVE-2019-15292&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15807&#34;&gt;CVE-2019-15807&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15917&#34;&gt;CVE-2019-15917&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15926&#34;&gt;CVE-2019-15926&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2016-10905&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in the GFS2 file-system
implementation, which could lead to a use-after-free.  On a system
using GFS2, a local attacker could use this for denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-20976&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the XFS file-system implementation did not
correctly handle some mount failure conditions, which could lead
to a use-after-free.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-21008&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the rsi wifi driver did not correctly
handle some failure conditions, which could lead to a use-after-
free.  The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-0136&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the wifi soft-MAC implementation (mac80211)
did not properly authenticate Tunneled Direct Link Setup (TDLS)
messages.  A nearby attacker could use this for denial of service
(loss of wifi connectivity).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9506&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen
discovered a weakness in the Bluetooth pairing protocols, dubbed
the &amp;quot;KNOB attack&amp;quot;.  An attacker that is nearby during pairing
could use this to weaken the encryption used between the paired
devices, and then to eavesdrop on and/or spoof communication
between them.

This update mitigates the attack by requiring a minimum encryption
key length of 56 bits.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14814, CVE-2019-14815, CVE-2019-14816&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple bugs were discovered in the mwifiex wifi driver, which
could lead to heap buffer overflows.  A local user permitted to
configure a device handled by this driver could probably use this
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14821&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Matt Delco reported a race condition in KVM&#39;s coalesced MMIO
facility, which could lead to out-of-bounds access in the kernel.
A local attacker permitted to access /dev/kvm could use this to
cause a denial of service (memory corruption or crash) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14835&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Peter Pi of Tencent Blade Team discovered a missing bounds check
in vhost_net, the network back-end driver for KVM hosts, leading
to a buffer overflow when the host begins live migration of a VM.
An attacker in control of a VM could use this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation on the host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15117&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hui Peng and Mathias Payer reported a missing bounds check in the
usb-audio driver&#39;s descriptor parsing code, leading to a buffer
over-read.  An attacker able to add USB devices could possibly use
this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15118&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hui Peng and Mathias Payer reported unbounded recursion in the
usb-audio driver&#39;s descriptor parsing code, leading to a stack
overflow.  An attacker able to add USB devices could use this to
cause a denial of service (memory corruption or crash) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15211&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a bug in the radio-raremono driver that
could lead to a use-after-free.  An attacker able to add and
remove USB devices could use this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15212&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found that the rio500 driver does not work
correctly if more than one device is bound to it.  An attacker
able to add USB devices could use this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15215&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a bug in the cpia2_usb driver that leads
to a use-after-free.  An attacker able to add and remove USB
devices could use this to cause a denial of service (memory
corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15218&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found that the smsusb driver did not validate
that USB devices have the expected endpoints, potentially leading
to a null pointer dereference.  An attacker able to add USB
devices could use this to cause a denial of service (BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15219&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found that a device initialisation error in the
sisusbvga driver could lead to a null pointer dereference.  An
attacker able to add USB devices could use this to cause a denial
of service (BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a race condition in the p54usb driver
which could lead to a use-after-free.  An attacker able to add and
remove USB devices could use this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found that the line6 driver did not validate
USB devices&#39; maximum packet sizes, which could lead to a heap
buffer overrun.  An attacker able to add USB devices could use
this to cause a denial of service (memory corruption or crash) or
possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15292&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The Hulk Robot tool found missing error checks in the Appletalk
protocol implementation, which could lead to a use-after-free.
The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15807&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jian Luo reported that the Serial Attached SCSI library (libsas)
did not correctly handle failure to discover devices beyond a SAS
expander.  This could lead to a resource leak and crash (BUG).
The security impact of this is unclear.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15917&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a race condition in code supporting
UART-attached Bluetooth adapters, which could lead to a use-
after-free.  A local user with access to a pty device or other
suitable tty device could use this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-15926&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was found that the ath6kl wifi driver did not consistently
validate traffic class numbers in received control packets,
leading to out-of-bounds memory accesses.  A nearby attacker on
the same wifi network could use this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-171-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-171-1-openssl/</link>
      <pubDate>Sun, 29 Sep 2019 23:04:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-171-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-171-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1547&#34;&gt;CVE-2019-1547&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1563&#34;&gt;CVE-2019-1563&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two security vulnerabilities were found in OpenSSL, the Secure Sockets
Layer toolkit.&lt;/p&gt;
&lt;p&gt;CVE-2019-1547&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Normally in OpenSSL EC groups always have a co-factor present and
this is used in side channel resistant code paths. However, in some
cases, it is possible to construct a group using explicit parameters
(instead of using a named curve). In those cases it is possible that
such a group does not have the cofactor present. This can occur even
where all the parameters match a known named curve. If such a curve
is used then OpenSSL falls back to non-side channel resistant code
paths which may result in full key recovery during an ECDSA
signature operation. In order to be vulnerable an attacker
would have to have the ability to time the creation of a large
number of signatures where explicit parameters with no co-factor
present are in use by an application using libcrypto. For the
avoidance of doubt libssl is not vulnerable because explicit
parameters are never used.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-1563&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In situations where an attacker receives automated notification of
the success or failure of a decryption attempt an attacker, after
sending a very large number of messages to be decrypted, can recover
a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted
message that was encrypted with the public RSA key, using a
Bleichenbacher padding oracle attack. Applications are not affected
if they use a certificate together with the private RSA key to the
CMS_decrypt or PKCS7_decrypt functions to select the correct
recipient info to decrypt.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-170-1 e2fsprogs security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-170-1-e2fsprogs/</link>
      <pubDate>Sat, 28 Sep 2019 11:32:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-170-1-e2fsprogs/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-170-1-e2fsprogs/">
      
&lt;p&gt;Package : e2fsprogs&lt;/p&gt;


&lt;p&gt;Version : 1.42.5-1.1&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5094&#34;&gt;CVE-2019-5094&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Lilith of Cisco Talos discovered a buffer overflow flaw in the quota
code used by e2fsck from the ext2/ext3/ext4 file system utilities.
Running e2fsck on a malformed file system can result in the execution of
arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-169-1 openldap security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-169-1-openldap/</link>
      <pubDate>Sat, 28 Sep 2019 11:21:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-169-1-openldap/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-169-1-openldap/">
      
&lt;p&gt;Package : openldap&lt;/p&gt;


&lt;p&gt;Version : 2.4.31-2&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13057&#34;&gt;CVE-2019-13057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13565&#34;&gt;CVE-2019-13565&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were discovered in openldap, a server and tools to provide a standalone directory service.&lt;/p&gt;
&lt;p&gt;CVE-2019-13057&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control.  (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13565&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-168-1 netty security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-168-1-netty/</link>
      <pubDate>Fri, 27 Sep 2019 16:05:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-168-1-netty/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-168-1-netty/">
      
&lt;p&gt;Package : netty&lt;/p&gt;


&lt;p&gt;Version : 3.2.6.Final-2&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16869&#34;&gt;CVE-2019-16869&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Netty mishandled whitespace before the colon in HTTP headers (such as a
&amp;ldquo;Transfer-Encoding : chunked&amp;rdquo; line), which lead to HTTP request
smuggling.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-167-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-167-1-cups/</link>
      <pubDate>Sat, 21 Sep 2019 19:33:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-167-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-167-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.5.3-5&amp;#43;deb7u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-4300&#34;&gt;CVE-2018-4300&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue was found in cups, the Common UNIX Printing System(tm). Linux session cookies used a predictable random number seed.&lt;/p&gt;
&lt;p&gt;This CVE is sometimes referenced as CVE-2018-4700. Please only use CVE-2018-4300 for it.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-166-1 libpng security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-166-1-libpng/</link>
      <pubDate>Sat, 21 Sep 2019 18:45:51 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-166-1-libpng/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-166-1-libpng/">
      
&lt;p&gt;Package : libpng&lt;/p&gt;


&lt;p&gt;Version : 1.2.49-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10087&#34;&gt;CVE-2016-10087&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Patrick Keshishian found a null pointer dereference in a function of libpng, a library to handle PNG files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-164-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-164-1-python2.7/</link>
      <pubDate>Mon, 16 Sep 2019 20:59:05 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-164-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-164-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.3-6&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-1753&#34;&gt;CVE-2013-1753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-4616&#34;&gt;CVE-2014-4616&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-4650&#34;&gt;CVE-2014-4650&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-7185&#34;&gt;CVE-2014-7185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16056&#34;&gt;CVE-2019-16056&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities have been discovered in Python, an interactive
high-level object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2019-16056&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module wrongly parses email addresses that contain
multiple @ characters. An application that uses the email module and 
implements some kind of checks on the From/To headers of a message
could be tricked into accepting an email address that should be
denied.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2013-1753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A denial of service (resource exhaustion, excessive memory
consumption) can be triggered in the xmlrpc library by a specially
crafted HTTP request.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-4616&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An attacker is able to read arbitrary process memory by a specially
crafted JSON string.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-4650&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Information disclosure or arbirtary code execution is possible via a
specially crafted URL because of improper handling of URL-encoded
path separators in the CGIHTTPServer module.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-7185&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A context-dependent attacker can take advantage of an integer
overflow to obtain sensitive information from process memory via a
large size and offset in a &amp;quot;buffer&amp;quot; function.     
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-165-1 python2.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-165-1-python2.6/</link>
      <pubDate>Mon, 16 Sep 2019 20:59:05 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-165-1-python2.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-165-1-python2.6/">
      
&lt;p&gt;Package : python2.6&lt;/p&gt;


&lt;p&gt;Version : 2.6.8-1.1&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-4238&#34;&gt;CVE-2013-4238&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-1912&#34;&gt;CVE-2014-1912&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-7185&#34;&gt;CVE-2014-7185&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16056&#34;&gt;CVE-2019-16056&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities have been discovered in Python, an interactive
high-level object-oriented language.&lt;/p&gt;
&lt;p&gt;CVE-2019-16056&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The email module wrongly parses email addresses that contain
multiple @ characters. An application that uses the email module and
implements some kind of checks on the From/To headers of a message
could be tricked into accepting an email address that should be
denied.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2013-4238&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A man-in-the-middle attack is possible by spoof of arbitrary SSL
servers via a crafted certificate resulting from improper handling
of &#39;\0&#39; characters in a domain name in the Subject Alternative Name
field of an X.509 certificate.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-1912&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Arbitrary remote code execution is possible via a crafted string
resulting from a buffer overflow in the socket.recvfrom_into
function.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-7185&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A context-dependent attacker can take advantage of an integer
overflow to obtain sensitive information from process memory via a
large size and offset in a &amp;quot;buffer&amp;quot; function.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-163-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-163-1-curl/</link>
      <pubDate>Sun, 15 Sep 2019 18:21:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-163-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-163-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.26.0-1&amp;#43;wheezy25&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5482&#34;&gt;CVE-2019-5482&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Thomas Vegas discovered a heap-based buffer overflow in the function
tftp_receive_packet() that receives data from a TFTP server. It can call
recvfrom() with the default size for the buffer rather than with the size that
was used to allocate it. Thus, the content that might overwrite the heap memory
is controlled by the server. This issue was introduced by the add of the TFTP
BLKSIZE option handling. It was previously incompletely fixed by an almost
identical issue called CVE-2019-5436.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-162-1 libonig security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-162-1-libonig/</link>
      <pubDate>Thu, 12 Sep 2019 11:32:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-162-1-libonig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-162-1-libonig/">
      
&lt;p&gt;Package : libonig&lt;/p&gt;


&lt;p&gt;Version : 5.9.1-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-16163&#34;&gt;CVE-2019-16163&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The Oniguruma regular expressions library, notably used in PHP
mbstring, is vulnerable to stack exhaustion.  A crafted regular
expression can crash the process.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-141-2 unzip regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-141-2-unzip/</link>
      <pubDate>Mon, 09 Sep 2019 12:47:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-141-2-unzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-141-2-unzip/">
      
&lt;p&gt;Package : unzip&lt;/p&gt;


&lt;p&gt;Version : 6.0-8&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13232&#34;&gt;CVE-2019-13232&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The unzip security update issued as ELA 141-1 caused a regression when
extracting some non-standard zip files.&lt;/p&gt;
&lt;p&gt;For instance there is a zip-like file in the Firefox distribution,
omni.ja, which is a zip container with the central directory placed at
the start of the file instead of after the local entries as required
by the zip standard.  This update now permits such containers to not
raise a zip bomb alert, where in fact there are no overlaps.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-161-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-161-1-expat/</link>
      <pubDate>Fri, 06 Sep 2019 15:31:44 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-161-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-161-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-1&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15903&#34;&gt;CVE-2019-15903&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A heap-based buffer overread vulnerability in expat, an XML parsing library.&lt;/p&gt;
&lt;p&gt;A specially-crafted XML input could fool the parser into changing from DTD
parsing to document parsing too early; a consecutive call to
&lt;code&gt;XML_GetCurrentLineNumber&lt;/code&gt; (or &lt;code&gt;XML_GetCurrentColumnNumber&lt;/code&gt;) then resulted in a
heap-based buffer overread.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-160-1 exim4 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-160-1-exim4/</link>
      <pubDate>Fri, 06 Sep 2019 12:25:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-160-1-exim4/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-160-1-exim4/">
      
&lt;p&gt;Package : exim4&lt;/p&gt;


&lt;p&gt;Version : 4.80-7&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15846&#34;&gt;CVE-2019-15846&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Zerons and Qualys discovered that a buffer overflow triggerable in the
TLS negotiation code of the Exim mail transport agent could result in the
execution of arbitrary code with root privileges.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-159-1 freetype security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-159-1-freetype/</link>
      <pubDate>Wed, 04 Sep 2019 14:53:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-159-1-freetype/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-159-1-freetype/">
      
&lt;p&gt;Package : freetype&lt;/p&gt;


&lt;p&gt;Version : 2.4.9-1.1&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9381&#34;&gt;CVE-2015-9381&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9382&#34;&gt;CVE-2015-9382&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9383&#34;&gt;CVE-2015-9383&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several newly-referenced issues have been fixed in the FreeType 2 font
engine.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2015-9381&lt;/p&gt;
&lt;p&gt;heap-based buffer over-read in T1_Get_Private_Dict in
type1/t1parse.c&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2015-9382&lt;/p&gt;
&lt;p&gt;buffer over-read in skip_comment in psaux/psobjs.c because
ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face
operation&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2015-9383&lt;/p&gt;
&lt;p&gt;a heap-based buffer over-read in tt_cmap14_validate in
sfnt/ttcmap.c&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-158-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-158-1-python2.7/</link>
      <pubDate>Sat, 31 Aug 2019 19:29:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-158-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-158-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.3-6&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20852&#34;&gt;CVE-2018-20852&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been discovered in Python, that is relevant for cookie handling. By using a malicious server an attacker might steal cookies that are meant for other domains&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-157-1 djvulibre security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-157-1-djvulibre/</link>
      <pubDate>Thu, 29 Aug 2019 20:11:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-157-1-djvulibre/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-157-1-djvulibre/">
      
&lt;p&gt;Package : djvulibre&lt;/p&gt;


&lt;p&gt;Version : 3.5.25.3-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15142&#34;&gt;CVE-2019-15142&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15143&#34;&gt;CVE-2019-15143&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15144&#34;&gt;CVE-2019-15144&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-15145&#34;&gt;CVE-2019-15145&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Hongxu Chen found several issues in djvulibre, a library and set of tools
to handle images in the DjVu format.
The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop
and an invalid read when working with crafted files as input.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-156-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-156-1-linux/</link>
      <pubDate>Mon, 26 Aug 2019 13:06:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-156-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-156-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.72-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18509&#34;&gt;CVE-2017-18509&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20836&#34;&gt;CVE-2018-20836&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1125&#34;&gt;CVE-2019-1125&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3900&#34;&gt;CVE-2019-3900&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10207&#34;&gt;CVE-2019-10207&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10638&#34;&gt;CVE-2019-10638&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13631&#34;&gt;CVE-2019-13631&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14283&#34;&gt;CVE-2019-14283&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-14284&#34;&gt;CVE-2019-14284&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2017-18509&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Denis Andzakovic reported a missing type check in the IPv4 multicast
routing implementation. A user with the CAP_NET_ADMIN capability (in
any user namespace) could use this for denial-of-service (memory
corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-20836&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;chenxiang reported a race condition in libsas, the kernel
subsystem supporting Serial Attached SCSI (SAS) devices, which
could lead to a use-after-free.  It is not clear how this might be
exploited.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-1125&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that most x86 processors could speculatively
skip a conditional SWAPGS instruction used when entering the
kernel from user mode, and/or could speculatively execute it when
it should be skipped.  This is a subtype of Spectre variant 1,
which could allow local users to obtain sensitive information from
the kernel or other processes.  It has been mitigated by using
memory barriers to limit speculative execution.  Systems using an
i386 kernel are not affected as the kernel does not use SWAPGS.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-3900&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that vhost drivers did not properly control the
amount of work done to service requests from guest VMs.  A
malicious guest could use this to cause a denial-of-service
(unbounded CPU usage) on the host.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10207&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a potential null dereference in various
drivers for UART-attached Bluetooth adapters.  A local user with
access to a pty device or other suitable tty device could use this
for denial-of-service (BUG/oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10638&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Amit Klein and Benny Pinkas discovered that the generation of IP
packet IDs used a weak hash function, &amp;quot;jhash&amp;quot;.  This could enable
tracking individual computers as they communicate with different
remote servers and from different networks.  The &amp;quot;siphash&amp;quot;
function is now used instead.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13631&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the gtco driver for USB input tablets could
overrun a stack buffer with constant data while parsing the device&#39;s
descriptor.  A physically present user with a specially
constructed USB device could use this to cause a denial-of-service
(BUG/oops), or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14283&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a missing bounds check in the floppy disk
driver.  A local user with access to a floppy disk device, with a
disk present, could use this to read kernel memory beyond the
I/O buffer, possibly obtaining sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-14284&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzkaller tool found a potential division-by-zero in the
floppy disk driver.  A local user with access to a floppy disk
device could use this for denial-of-service (oops).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;(CVE ID not yet assigned)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Denis Andzakovic reported a possible use-after-free in the
TCP sockets implementation.  A local user could use this for
denial-of-service (memory corruption or crash) or possibly
for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;(CVE ID not yet assigned)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The netfilter conntrack subsystem used kernel addresses as
user-visible IDs, which could make it easier to exploit other
security vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;XSA-300&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Julien Grall reported that Linux does not limit the amount of memory
which a domain will attempt to balloon out, nor limits the amount of
&amp;quot;foreign / grant map&amp;quot; memory which any individual guest can consume,
leading to denial of service conditions (for host or guests).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-155-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-155-1-cups/</link>
      <pubDate>Sat, 24 Aug 2019 19:29:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-155-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-155-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.5.3-5&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8675&#34;&gt;CVE-2019-8675&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8696&#34;&gt;CVE-2019-8696&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in cups, the Common UNIX Printing System(tm).&lt;/p&gt;
&lt;p&gt;Basically both CVEs (CVE-2019-8675 and CVE-2019-8696) are about
stack-buffer-overflow in two functions of libcup. One happens in
asn1_get_type() the other one in asn1_get_packed().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-154-2 openjdk-7 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-154-2-openjdk-7/</link>
      <pubDate>Fri, 23 Aug 2019 00:14:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-154-2-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-154-2-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u231-2.6.19-1~deb7u2&lt;/p&gt;


      &lt;p&gt;The latest security update of openjdk-7 caused a regression when
applications relied on elliptic curve algorithms to establish SSL
connections. Several duplicate classes were removed from rt.jar by the
upstream developers of OpenJDK because they were also present in
sunec.jar. However Debian never shipped the SunEC security provider in
OpenJDK 7.&lt;/p&gt;
&lt;p&gt;The issue was resolved by building sunec.jar and its corresponding
native library libsunec.so from source. In order to build these
libraries from source, an update of nss to version 2:3.26-1+debu7u8 is
required.&lt;/p&gt;
&lt;p&gt;Updates for the amd64 architecture are already available, new packages
for i386 will be available within the next 24 hours.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-154-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-154-1-openjdk-7/</link>
      <pubDate>Sat, 17 Aug 2019 00:06:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-154-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-154-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u231-2.6.19-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2745&#34;&gt;CVE-2019-2745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2762&#34;&gt;CVE-2019-2762&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2769&#34;&gt;CVE-2019-2769&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2816&#34;&gt;CVE-2019-2816&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, information disclosure or the execution
of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-153-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-153-1-tomcat7/</link>
      <pubDate>Tue, 13 Aug 2019 23:25:12 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-153-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-153-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-5388&#34;&gt;CVE-2016-5388&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An outbound HTTP traffic redirection issue was found in tomcat7, a
Java Servlet and JSP engine.&lt;/p&gt;
&lt;p&gt;Apache Tomcat, when the CGI Servlet is enabled, follows RFC 3875
section 4.1.18 and therefore does not protect applications from the
presence of untrusted client data in the HTTP_PROXY environment
variable, which might allow remote attackers to redirect an
application&amp;rsquo;s outbound HTTP traffic to an arbitrary proxy server via a
crafted Proxy header in an HTTP request, aka an &amp;ldquo;httpoxy&amp;rdquo; issue.&lt;/p&gt;
&lt;p&gt;The &amp;lsquo;cgi&amp;rsquo; servlet now has a &amp;rsquo;envHttpHeaders&amp;rsquo; parameter to filter
environment variables.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-152-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-152-1-php5/</link>
      <pubDate>Mon, 12 Aug 2019 23:52:25 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-152-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-152-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u24&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11041&#34;&gt;CVE-2019-11041&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11042&#34;&gt;CVE-2019-11042&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two heap buffer overflows were found in the EXIF parsing code of PHP,
a widely-used open source general purpose scripting language.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-151-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-151-1-linux/</link>
      <pubDate>Tue, 06 Aug 2019 15:56:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-151-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-151-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.70-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2101&#34;&gt;CVE-2019-2101&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10639&#34;&gt;CVE-2019-10639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13272&#34;&gt;CVE-2019-13272&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2019-2101&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andrey Konovalov discovered that the USB Video Class driver
(uvcvideo) did not consistently handle a type field in device
descriptors, which could result in a heap buffer overflow.  This
could be used for denial of service or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10639&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Amit Klein and Benny Pinkas discovered that the generation of IP
packet IDs used a weak hash function that incorporated a kernel
virtual address.  In Linux 3.16 this hash function is not used for
IP IDs but is used for other purposes in the network stack.  In
custom kernel configurations that enable kASLR, this might weaken
kASLR.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13272&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered that the ptrace subsystem in the Linux kernel
mishandles the management of the credentials of a process that wants
to create a ptrace relationship, allowing a local user to obtain root
privileges under certain scenarios.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This update also fixes a regression introduced by the
original fix for CVE-2019-11478 (#930904), and includes other fixes
from upstream stable updates.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-140-2 glib2.0 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-140-2-glib2.0/</link>
      <pubDate>Tue, 06 Aug 2019 00:27:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-140-2-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-140-2-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.33.12&amp;#43;really2.32.4-5&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13012&#34;&gt;CVE-2019-13012&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Simon McVittie spotted a memory leak regression in the way CVE-2019-13012 had been resolved
for glib2.0 in Debian wheezy ELTS.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-150-1 vim security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-150-1-vim/</link>
      <pubDate>Sat, 03 Aug 2019 12:24:45 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-150-1-vim/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-150-1-vim/">
      
&lt;p&gt;Package : vim&lt;/p&gt;


&lt;p&gt;Version : 7.3.547-7&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17087&#34;&gt;CVE-2017-17087&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12735&#34;&gt;CVE-2019-12735&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been fixed in vim, a highly configurable
text editor.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-17087&lt;/p&gt;
&lt;p&gt;Vim sets the group ownership of a .swp file to the editor&amp;rsquo;s
primary group (which may be different from the group ownership of
the original file), which allows local users to obtain sensitive
information by leveraging an applicable group membership.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2019-12735&lt;/p&gt;
&lt;p&gt;Vim did not restrict the &lt;code&gt;:source!&lt;/code&gt; command when executed in a
sandbox.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-149-1 freetype security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-149-1-freetype/</link>
      <pubDate>Wed, 31 Jul 2019 20:12:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-149-1-freetype/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-149-1-freetype/">
      
&lt;p&gt;Package : freetype&lt;/p&gt;


&lt;p&gt;Version : 2.4.9-1.1&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9290&#34;&gt;CVE-2015-9290&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In FreeType a buffer over-read occured in type1/t1parse.c on function
T1_Get_Private_Dict. The fix assures that &amp;lsquo;cur&amp;rsquo; in the parser code
doesn&amp;rsquo;t point to the end of the file buffer.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-99-3 libssh2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-99-3-libssh2/</link>
      <pubDate>Tue, 30 Jul 2019 20:53:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-99-3-libssh2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-99-3-libssh2/">
      
&lt;p&gt;Package : libssh2&lt;/p&gt;


&lt;p&gt;Version : 1.4.2-1.1&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3859&#34;&gt;CVE-2019-3859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3860&#34;&gt;CVE-2019-3860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13115&#34;&gt;CVE-2019-13115&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2019-3859: While investigating the impact of CVE-2019-13115 in Debian
jessie&amp;rsquo;s version of libssh2, it was discovered that issues around
CVE-2019-3859 had not been fully resolved in Debian jessie&amp;rsquo;s version of
libssh2. A thorough manual (read, analyze, and copy code changes if
needed) comparison of upstream code and code in Debian jessie&amp;rsquo;s version
of libssh2 was done and various more boundary checks and integer overflow
protections got added to the package.&lt;/p&gt;
&lt;p&gt;CVE-2019-13115: Kevin Backhouse from semmle.com discovered that initial
fixes for the CVE series CVE-2019-3855 - 2019-3863 introduced several
regressions about signedness of length return values into the upstream
code. While working on the CVE-2019-3859 update mentioned above, it was
paid attention to not introduce these upstream regression registered as
CVE-2019-13115.&lt;/p&gt;
&lt;p&gt;CVE-2019-3860: Several more boundary checks have been backported to
src/sftp.c. Furthermore, all boundary checks in src/sftp.c now result in
an LIBSSH2_ERROR_BUFFER_TOO_SMALL error code, rather than a
LIBSSH2_ERROR_ OUT_OF_BOUNDARY error code. This e.g. avoids a segfault in
kftpgrabber&amp;rsquo;s SFTP code.&lt;/p&gt;
&lt;p&gt;As a side note, it was discovered that libssh2&amp;rsquo;s SFTP implementation from
Debian wheezy only works well against openssh SFTP servers from Debian
wheezy, tests against newer openssh versions (such as available in Debian
jessie and beyond) failed with SFTP protocol error &amp;ldquo;Error opening remote
file&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-148-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-148-1-bind9/</link>
      <pubDate>Sat, 27 Jul 2019 12:12:16 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-148-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-148-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.8.4.dfsg.P1-6&amp;#43;nmu2&amp;#43;deb7u23&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5743&#34;&gt;CVE-2018-5743&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was found in the Bind DNS Server. Limits on simultaneous tcp connections have not been enforced correctly and could lead to exhaustion of file descriptors. In the worst case this could affect the file descriptors of the whole system.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-147-1 patch security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-147-1-patch/</link>
      <pubDate>Thu, 25 Jul 2019 15:55:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-147-1-patch/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-147-1-patch/">
      
&lt;p&gt;Package : patch&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-3&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13638&#34;&gt;CVE-2019-13638&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An issue with quoting has been found when invoking ed. In order to avoid this, ed is now directly started instead of calling a shell which starts ed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-146-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-146-1-nss/</link>
      <pubDate>Sat, 20 Jul 2019 16:54:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-146-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-146-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11719&#34;&gt;CVE-2019-11719&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11729&#34;&gt;CVE-2019-11729&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities have been discovered in nss, the Mozilla Network
Security Service library.&lt;/p&gt;
&lt;p&gt;CVE-2019-11719: Out-of-bounds read when importing curve25519 private key&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When importing a curve25519 private key in PKCS#8format with leading
0x00 bytes, it is possible to trigger an out-of-bounds read in the
Network Security Services (NSS) library. This could lead to
information disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a
segmentation fault&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Empty or malformed p256-ECDH public keys may trigger a segmentation
fault due values being improperly sanitized before being copied into
memory and used.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-145-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-145-1-libxslt/</link>
      <pubDate>Sat, 20 Jul 2019 17:53:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-145-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-145-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.26-14.1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-4609&#34;&gt;CVE-2016-4609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-4610&#34;&gt;CVE-2016-4610&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2016-4610&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Invalid memory access leading to DoS at exsltDynMapFunction. libxslt allows
remote attackers to cause a denial of service (memory corruption) or
possibly have unspecified other impact via unknown vectors.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-4609&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Out-of-bounds read at xmlGetLineNoInternal()
libxslt allows remote attackers to cause a denial of service (memory
corruption) or possibly have unspecified other impact via unknown vectors.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-144-1 patch security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-144-1-patch/</link>
      <pubDate>Fri, 19 Jul 2019 23:40:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-144-1-patch/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-144-1-patch/">
      
&lt;p&gt;Package : patch&lt;/p&gt;


&lt;p&gt;Version : 2.6.1-3&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13636&#34;&gt;CVE-2019-13636&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The handling of symlinks while creating backup files had to be improved.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-132-2 bzip2 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-132-2-bzip2/</link>
      <pubDate>Thu, 18 Jul 2019 19:49:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-132-2-bzip2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-132-2-bzip2/">
      
&lt;p&gt;Package : bzip2&lt;/p&gt;



&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12900&#34;&gt;CVE-2019-12900&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The original fix for CVE-2019-12900 introduces regressions when extracting certain lbzip2 files which were created with a buggy libzip2: &lt;a href=&#34;https://bugs.debian.org/931278&#34;&gt;https://bugs.debian.org/931278&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-143-1 libonig security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-143-1-libonig/</link>
      <pubDate>Wed, 17 Jul 2019 02:27:01 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-143-1-libonig/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-143-1-libonig/">
      
&lt;p&gt;Package : libonig&lt;/p&gt;


&lt;p&gt;Version : 5.9.1-1&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13224&#34;&gt;CVE-2019-13224&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A use-after-free in onig_new_deluxe() in regext.c allows attackers to potentially
cause information disclosure, denial of service, or possibly code execution by
providing a crafted regular expression. The attacker provides a pair of a regex
pattern and a string, with a multi-byte encoding that gets handled by
onig_new_deluxe().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-142-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-142-1-libxslt/</link>
      <pubDate>Thu, 11 Jul 2019 20:11:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-142-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-142-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.26-14.1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13117&#34;&gt;CVE-2019-13117&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13118&#34;&gt;CVE-2019-13118&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two flaws were discovered in libxslt, the XSLT processing library.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CVE-2019-13117

An xsl:number with certain format strings could lead to an uninitialized
read in xsltNumberFormatInsertNumbers. This could allow an attacker to
discern whether a byte on the stack contains the characters A, a, I, i, or
0, or any other character.

CVE-2019-13118

A type holding grouping characters of an xsl:number instruction was too
narrow and an invalid character/length combination could be passed to
xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-141-1 unzip security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-141-1-unzip/</link>
      <pubDate>Tue, 09 Jul 2019 23:23:20 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-141-1-unzip/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-141-1-unzip/">
      
&lt;p&gt;Package : unzip&lt;/p&gt;


&lt;p&gt;Version : 6.0-8&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13232&#34;&gt;CVE-2019-13232&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;David Fifield discovered a way to construct non-recursive &amp;ldquo;zip bombs&amp;rdquo; that
achieve a high compression ratio by overlapping files inside the zip
container. However the output size increases quadratically in the input
size, reaching a compression ratio of over 28 million (10 MB -&amp;gt; 281 TB) at
the limits of the zip format which can cause a denial-of-service. Mark
Adler provided a patch to detect and reject such zip files for the unzip
program.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-140-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-140-1-glib2.0/</link>
      <pubDate>Fri, 05 Jul 2019 23:27:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-140-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-140-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.33.12&amp;#43;really2.32.4-5&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16428&#34;&gt;CVE-2018-16428&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16429&#34;&gt;CVE-2018-16429&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-13012&#34;&gt;CVE-2019-13012&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several flaws were corrected in glib2.0, a general-purpose C library.&lt;/p&gt;
&lt;p&gt;CVE-2018-16428&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference may lead to a denial-of-service (application
crash) when parsing a document.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-16429&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;While parsing an invalid string an out-of-bounds read may occur which can
lead to an access violation error or may have other unspecified impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-13012&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The keyfile settings backend in GNOME GLib creates directories and files
with insecure permissions. This is similar to CVE-2019-12450.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-139-1 bash security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-139-1-bash/</link>
      <pubDate>Wed, 03 Jul 2019 13:38:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-139-1-bash/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-139-1-bash/">
      
&lt;p&gt;Package : bash&lt;/p&gt;


&lt;p&gt;Version : 4.2&amp;#43;dfsg-0.1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2012-6711&#34;&gt;CVE-2012-6711&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A heap-based buffer overflow was discovered in bash caused by a wrong
handling of unsupported characters in the function u32cconv(). When
LC_CTYPE locale cannot correctly convert a wide character to a multibyte
sequence, through the wctomb() function, u32cconv() returns a negative
value that is used to update a pointer to a buffer in ansicstr(), resulting
in a write out of the buffer&amp;rsquo;s bounds. A local attacker, who can provide
data to print through the &lt;code&gt;echo&lt;/code&gt; builtin function, may use this flaw to
crash a script or execute code with the privileges of the bash process
(e.g. escape a restricted bash or elevate privileges if a setuid script is
vulnerable).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-138-1 ntfs-3g security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-138-1-ntfs-3g/</link>
      <pubDate>Sat, 29 Jun 2019 19:50:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-138-1-ntfs-3g/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-138-1-ntfs-3g/">
      
&lt;p&gt;Package : ntfs-3g&lt;/p&gt;


&lt;p&gt;Version : 1:2012.1.15AR.5-2.1&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9755&#34;&gt;CVE-2019-9755&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A heap-based buffer overflow was discovered in NTFS-3G, a read-write NTFS driver for FUSE. A local user can take advantage of this flaw for local root privilege escalation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-137-1 libvirt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-137-1-libvirt/</link>
      <pubDate>Fri, 28 Jun 2019 22:10:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-137-1-libvirt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-137-1-libvirt/">
      
&lt;p&gt;Package : libvirt&lt;/p&gt;


&lt;p&gt;Version : 0.9.12.3-1&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10161&#34;&gt;CVE-2019-10161&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A number of related vulnerabilities in the libvirt management API were recently
discovered and fixed by the libvirt maintainers. These vulnerabilities expose
unintended functionality to API clients with read-only permissions that could
be used by the client to perform operations outside their normal sphere of
permissions. An attacker could test for the existence of files on the host as
root. Libvirtd can be given an arbitrary path to read a saved state file,
which it will attempt to read. This may also be exploited for a
denial-of-service attack by choosing particular paths in /dev or /proc.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-136-1 expat security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-136-1-expat/</link>
      <pubDate>Thu, 27 Jun 2019 22:03:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-136-1-expat/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-136-1-expat/">
      
&lt;p&gt;Package : expat&lt;/p&gt;


&lt;p&gt;Version : 2.1.0-1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20843&#34;&gt;CVE-2018-20843&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;In libexpat in Expat, XML input including XML names that contained a
large number of colons could have made the XML parser consume a high
amount of RAM and CPU resources while processing (enough to be usable for
denial-of-service attacks).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-134-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-134-1-python2.7/</link>
      <pubDate>Tue, 25 Jun 2019 03:25:21 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-134-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-134-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.3-6&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9636&#34;&gt;CVE-2019-9636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9740&#34;&gt;CVE-2019-9740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9947&#34;&gt;CVE-2019-9947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9948&#34;&gt;CVE-2019-9948&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10160&#34;&gt;CVE-2019-10160&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Python, an interactive
high-level object-oriented language, including&lt;/p&gt;
&lt;p&gt;CVE-2019-9636&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Handling of Unicode Encoding (with an incorrect netloc)
during NFKC normalization resulting in information disclosure
(credentials, cookies, etc. that are cached against a given
hostname).  A specially crafted URL could be incorrectly parsed to
locate cookies or authentication data and send that information to
a different host than when parsed correctly.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9740&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in urllib2 where CRLF injection is possible
if the attacker controls a url parameter, as demonstrated by the
first argument to urllib.request.urlopen with \r\n (specifically in
the query string after a ? character) followed by an HTTP header or
a Redis command.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9947&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in urllib2 where CRLF injection is possible
if the attacker controls a url parameter, as demonstrated by the
first argument to urllib.request.urlopen with \r\n (specifically in
the path component of a URL that lacks a ? character) followed by an
HTTP header or a Redis command. This is similar to the CVE-2019-9740
query string issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9948&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;urllib supports the local_file: scheme, which makes it easier for
remote attackers to bypass protection mechanisms that blacklist
file: URIs, as demonstrated by triggering a
urllib.urlopen(&#39;local_file:///etc/passwd&#39;) call.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-10160&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A security regression of CVE-2019-9636 was discovered which still
allows an attacker to exploit CVE-2019-9636 by abusing the user and
password parts of a URL. When an application parses user-supplied
URLs to store cookies, authentication credentials, or other kind of
information, it is possible for an attacker to provide specially
crafted URLs to make the application locate host-related information
(e.g. cookies, authentication data) and send them to a different
host than where it should, unlike if the URLs had been correctly
parsed. The result of an attack may vary based on the application.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-135-1 python2.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-135-1-python2.6/</link>
      <pubDate>Tue, 25 Jun 2019 03:25:02 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-135-1-python2.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-135-1-python2.6/">
      
&lt;p&gt;Package : python2.6&lt;/p&gt;


&lt;p&gt;Version : 2.6.8-1.1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9636&#34;&gt;CVE-2019-9636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9740&#34;&gt;CVE-2019-9740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9947&#34;&gt;CVE-2019-9947&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9948&#34;&gt;CVE-2019-9948&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities were discovered in Python, an interactive
high-level object-oriented language, including&lt;/p&gt;
&lt;p&gt;CVE-2019-9636&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Improper Handling of Unicode Encoding (with an incorrect netloc)
during NFKC normalization resulting in information disclosure
(credentials, cookies, etc. that are cached against a given
hostname).  A specially crafted URL could be incorrectly parsed to
locate cookies or authentication data and send that information to
a different host than when parsed correctly.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9740&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in urllib2 where CRLF injection is possible
if the attacker controls a url parameter, as demonstrated by the
first argument to urllib.request.urlopen with \r\n (specifically in
the query string after a ? character) followed by an HTTP header or
a Redis command.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9947&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An issue was discovered in urllib2 where CRLF injection is possible
if the attacker controls a url parameter, as demonstrated by the
first argument to urllib.request.urlopen with \r\n (specifically in
the path component of a URL that lacks a ? character) followed by an
HTTP header or a Redis command. This is similar to the CVE-2019-9740
query string issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9948&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;urllib supports the local_file: scheme, which makes it easier for
remote attackers to bypass protection mechanisms that blacklist
file: URIs, as demonstrated by triggering a
urllib.urlopen(&#39;local_file:///etc/passwd&#39;) call.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-133-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-133-1-linux/</link>
      <pubDate>Sun, 23 Jun 2019 18:12:23 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-133-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-133-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.68-2~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3846&#34;&gt;CVE-2019-3846&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5489&#34;&gt;CVE-2019-5489&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10126&#34;&gt;CVE-2019-10126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11477&#34;&gt;CVE-2019-11477&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11478&#34;&gt;CVE-2019-11478&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11479&#34;&gt;CVE-2019-11479&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11810&#34;&gt;CVE-2019-11810&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11833&#34;&gt;CVE-2019-11833&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11884&#34;&gt;CVE-2019-11884&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2019-3846, CVE-2019-10126&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;huangwen reported multiple buffer overflows in the Marvell wifi
(mwifiex) driver, which a local user could use to cause denial of
service or the execution of arbitrary code.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-5489&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari
Trachtenberg, Jason Hennessey, Alex Ionescu, and Anders Fogh
discovered that local users could use the mincore() system call to
obtain sensitive information from other processes that access the
same memory-mapped file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11477&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jonathan Looney reported that a specially crafted sequence of TCP
selective acknowledgements (SACKs) allows a remotely triggerable
kernel panic.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11478&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jonathan Looney reported that a specially crafted sequence of TCP
selective acknowledgements (SACKs) will fragment the TCP
retransmission queue, allowing an attacker to cause excessive
resource usage.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11479&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jonathan Looney reported that an attacker could force the Linux
kernel to segment its responses into multiple TCP segments, each of
which contains only 8 bytes of data, drastically increasing the
bandwidth required to deliver the same amount of data.

This update introduces a new sysctl value to control the minimal MSS
(net.ipv4.tcp_min_snd_mss), which by default uses the formerly hard-
coded value of 48.  We recommend raising this to 512 unless you know
that your network requires a lower value.  (This value applies to
Linux 3.16 only.)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11810&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the megaraid_sas driver did not correctly
handle a failed memory allocation during initialisation, which
could lead to a double-free.  This might have some security
impact, but it cannot be triggered by an unprivileged user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11833&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the ext4 filesystem implementation writes
uninitialised data from kernel memory to new extent blocks.  A
local user able to write to an ext4 filesystem and then read the
filesystem image, for example using a removable drive, might be
able to use this to obtain sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11884&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Bluetooth HIDP implementation did not
ensure that new connection names were null-terminated.  A local
user with CAP_NET_ADMIN capability might be able to use this to
obtain sensitive information from the kernel stack.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-132-1 bzip2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-132-1-bzip2/</link>
      <pubDate>Sat, 22 Jun 2019 23:14:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-132-1-bzip2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-132-1-bzip2/">
      
&lt;p&gt;Package : bzip2&lt;/p&gt;


&lt;p&gt;Version : 1.0.6-4&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-3189&#34;&gt;CVE-2016-3189&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12900&#34;&gt;CVE-2019-12900&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues in bzip2, a high-quality block-sorting file compressor, have been fixed. One, CVE-2019-12900, is a out-of-bounds write when using a crafted compressed file. The other, CVE-2016-3189, is a potential user-after-free.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-121-2 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-121-2-intel-microcode/</link>
      <pubDate>Fri, 21 Jun 2019 11:40:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-121-2-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-121-2-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20190618.1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12126&#34;&gt;CVE-2018-12126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12127&#34;&gt;CVE-2018-12127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12130&#34;&gt;CVE-2018-12130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11091&#34;&gt;CVE-2019-11091&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;ELA-121-1 shipped updated CPU microcode for most types of Intel CPUs as
mitigations for the MSBDS, MFBDS, MLPDS and MDSUM hardware vulnerabilities.&lt;/p&gt;
&lt;p&gt;This update provides additional support for some Sandybridge server
and Core-X CPUs which were not covered in the original May microcode
release. For a list of specific CPU models now supported please refer
to the entries listed under CPUID 206D6 and 206D7 at
&lt;a href=&#34;https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf&#34;&gt;https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-131-1 suricata security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-131-1-suricata/</link>
      <pubDate>Thu, 20 Jun 2019 10:03:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-131-1-suricata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-131-1-suricata/">
      
&lt;p&gt;Package : suricata&lt;/p&gt;


&lt;p&gt;Version : 1.2.1-2&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10053&#34;&gt;CVE-2019-10053&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that suricata, the network threat detection engine, is
vulnerable to a buffer overflow issue when parsing SSH banners. This flaw might
be leveraged by remote attackers to cause unauthorized disclosure and
modification of information, or denial of service via a crafted SSH banner.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-130-1 dbus security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-130-1-dbus/</link>
      <pubDate>Fri, 14 Jun 2019 13:49:00 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-130-1-dbus/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-130-1-dbus/">
      
&lt;p&gt;Package : dbus&lt;/p&gt;


&lt;p&gt;Version : 1.6.8-1&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12749&#34;&gt;CVE-2019-12749&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Joe Vennix discovered an authentication bypass vulnerability in dbus, an
asynchronous inter-process communication system. The implementation of
the DBUS_COOKIE_SHA1 authentication mechanism was susceptible to a
symbolic link attack. A local attacker could take advantage of this flaw
to bypass authentication and connect to a DBusServer with elevated
privileges.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-129-1 mysql-5.5 end of life</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-129-1-mysql-5.5/</link>
      <pubDate>Thu, 06 Jun 2019 14:42:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-129-1-mysql-5.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-129-1-mysql-5.5/">
      


      &lt;p&gt;Upstream has ended the support for the MySQL 5.5 release series, and since
no information is available which would allow backports of isolated
security fixes, security support for MySQL in wheezy has to be ended as well.&lt;/p&gt;
&lt;p&gt;Support will end on June 30th, 2019. Any serious flaws that are discovered
before then will be backported if feasible.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-127-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-127-1-linux/</link>
      <pubDate>Mon, 03 Jun 2019 16:00:27 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-127-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-127-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.68-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5995&#34;&gt;CVE-2018-5995&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12126&#34;&gt;CVE-2018-12126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12127&#34;&gt;CVE-2018-12127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12130&#34;&gt;CVE-2018-12130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2024&#34;&gt;CVE-2019-2024&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3459&#34;&gt;CVE-2019-3459&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3460&#34;&gt;CVE-2019-3460&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3882&#34;&gt;CVE-2019-3882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3901&#34;&gt;CVE-2019-3901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-6133&#34;&gt;CVE-2019-6133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9503&#34;&gt;CVE-2019-9503&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11091&#34;&gt;CVE-2019-11091&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11190&#34;&gt;CVE-2019-11190&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11486&#34;&gt;CVE-2019-11486&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11599&#34;&gt;CVE-2019-11599&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2018-5995&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;ADLab of VenusTech discovered that the kernel logged the virtual
addresses assigned to per-CPU data, which could make it easier to
exploit other vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers have discovered vulnerabilities in the way
that Intel processor designs implement speculative forwarding of
data filled into temporary microarchitectural structures
(buffers).  This flaw could allow an attacker controlling an
unprivileged process to read sensitive information, including from
the kernel and all other processes running on the system, or
across guest/host boundaries to read host memory.

See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html
for more details.

To fully resolve these vulnerabilities it is also necessary to
install updated CPU microcode.  An updated intel-microcode package
(only available in Debian non-free) was provided via ELA-121-1.
The updated CPU microcode may also be available as part of a
system firmware (&amp;quot;BIOS&amp;quot;) update.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-2024&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free bug was discovered in the em28xx video capture
driver.  Local users might be able to use this for denial of
service (memory corruption or crash) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-3459, CVE-2019-3460&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Shlomi Oberman, Yuli Shapiro, and Karamba Security Ltd. research
team discovered missing range checks in the Bluetooth L2CAP
implementation.  If Bluetooth is enabled, a nearby attacker
could use these to read sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-3882&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was found that the vfio implementation did not limit the number
of DMA mappings to device memory.  A local user granted ownership
of a vfio device could use this to cause a denial of service
(out-of-memory condition).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-3901&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn of Google reported a race condition that would allow a
local user to read performance events from a task after it
executes a setuid program.  This could leak sensitive information
processed by setuid programs.  Debian&#39;s kernel configuration does
not allow unprivileged users to access peformance events by
default, which fully mitigates this issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-6133&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn of Google found that Policykit&#39;s authentication check
could be bypassed by a local user creating a process with the same
start time and process ID as an older authenticated process.
The kernel has additionally been updated to avoid a delay between
assigning start time and process ID, which should make the attack
impractical.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9503&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hugues Anguelkov and others at Quarkslab discovered that the
brcmfmac (Broadcom wifi FullMAC) driver did not correctly
distinguish messages sent by the wifi firmware from other packets.
An attacker using the same wifi network could use this for denial
of service or to exploit other vulnerabilities in the driver.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11190&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Robert Święcki reported that when a setuid program was executed it
was still possible to read performance events while the kernel set
up the program&#39;s address space.  A local user could use this to
defeat ASLR in a setuid program, making it easier to exploit other
vulnerabilities in the program.  Debian&#39;s kernel configuration
does not allow unprivileged users to access peformance events by
default, which fully mitigates this issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11486&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn of Google reported numerous race conditions in the
Siemens R3964 line discipline.  A local user could use these to
cause unspecified security impact.  This module has therefore been
disabled.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11599&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn of Google reported a race condition in the core dump
implementation which could lead to a use-after-free.  A local
user could use this to read sensitive information, to cause a
denial of service (memory corruption), or for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This version also includes a fix for Debian bug #927781,
and other fixes included in upstream stable updates.&lt;/p&gt;
&lt;p&gt;You will need to use &amp;ldquo;apt-get upgrade &amp;ndash;with-new-pkgs&amp;rdquo;
as the binary package names have changed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-128-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-128-1-php5/</link>
      <pubDate>Mon, 03 Jun 2019 13:37:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-128-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-128-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u23&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11039&#34;&gt;CVE-2019-11039&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11040&#34;&gt;CVE-2019-11040&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were found in PHP, a widely-used open source general
purpose scripting language.&lt;/p&gt;
&lt;p&gt;CVE-2019-11039&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer underflow in the iconv module could be exploited to trigger
an out of bounds read.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-11040&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap buffer overflow was discovered in the EXIF parsing code.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-126-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-126-1-wireshark/</link>
      <pubDate>Sun, 02 Jun 2019 15:36:04 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-126-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-126-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9345&#34;&gt;CVE-2017-9345&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9352&#34;&gt;CVE-2017-9352&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9617&#34;&gt;CVE-2017-9617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13767&#34;&gt;CVE-2017-13767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12295&#34;&gt;CVE-2019-12295&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in wireshark, a network traffic analyzer.&lt;/p&gt;
&lt;p&gt;CVE-2017-9345: infinite loop in DNS dissector.&lt;/p&gt;
&lt;p&gt;CVE-2017-9352: infinite loop in Bazaar dissector.&lt;/p&gt;
&lt;p&gt;CVE-2017-9617: stack exhaustion in adissect_daap_one_tag (DAAP dissector).&lt;/p&gt;
&lt;p&gt;CVE-2017-13767: infinite loop in MSDP dissector.&lt;/p&gt;
&lt;p&gt;CVE-2019-12295: stack overflow in the dissection engine.&lt;/p&gt;
&lt;p&gt;These vulnerabilities might be leveraged by remote attackers to cause denial of service (DoS) via a crafted packet or PCAP file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-125-1 glib2.0 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-125-1-glib2.0/</link>
      <pubDate>Sat, 01 Jun 2019 01:28:13 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-125-1-glib2.0/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-125-1-glib2.0/">
      
&lt;p&gt;Package : glib2.0&lt;/p&gt;


&lt;p&gt;Version : 2.33.12&amp;#43;really2.32.4-5&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-12450&#34;&gt;CVE-2019-12450&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The file_copy_fallback() function/method in gio/gfile.c in GNOME GLib did
not properly restrict file permissions while a copy operation was in
progress. Instead, default permissions were used. A similar issue of the
need of tigher permissions was also spotted still unfixed in the keyfile
settings (gio/gkeyfilesettingsbackend.c).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-124-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-124-1-tomcat7/</link>
      <pubDate>Fri, 31 May 2019 10:14:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-124-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-124-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0221&#34;&gt;CVE-2019-0221&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that the SSI printenv command echoes user provided data
without escaping and is, therefore, vulnerable to XSS. SSI is disabled by
default. The printenv command is intended for debugging and is unlikely to be
present in a production website.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-123-1 sqlite3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-123-1-sqlite3/</link>
      <pubDate>Fri, 31 May 2019 03:51:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-123-1-sqlite3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-123-1-sqlite3/">
      
&lt;p&gt;Package : sqlite3&lt;/p&gt;


&lt;p&gt;Version : 3.7.13-1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8457&#34;&gt;CVE-2019-8457&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;SQLite3 was vulnerable to heap out-of-bound read in the rtreenode()
function when handling invalid rtree tables.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-122-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-122-1-curl/</link>
      <pubDate>Mon, 27 May 2019 22:00:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-122-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-122-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.26.0-1&amp;#43;wheezy25&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5436&#34;&gt;CVE-2019-5436&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;cURL, an URL transfer library, contains a heap buffer overflow in the
function tftp_receive_packet() that receives data from a TFTP server.
It calls recvfrom() with the default size for the buffer rather than
with the size that was used to allocate it. Thus, the content that
might overwrite the heap memory is entirely controlled by the server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-121-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-121-1-intel-microcode/</link>
      <pubDate>Mon, 27 May 2019 16:32:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-121-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-121-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20190514.1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12126&#34;&gt;CVE-2018-12126&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12127&#34;&gt;CVE-2018-12127&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12130&#34;&gt;CVE-2018-12130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11091&#34;&gt;CVE-2019-11091&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update ships updated CPU microcode for most types of Intel CPUs. It
provides microcode support to implement mitigations for the MSBDS,
MFBDS, MLPDS and MDSUM hardware vulnerabilities.&lt;/p&gt;
&lt;p&gt;To fully resolve these vulnerabilities it is also necessary to update
the Linux kernel packages. An update for that will follow soon.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-120-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-120-1-php5/</link>
      <pubDate>Sat, 25 May 2019 12:35:52 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-120-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-120-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11036&#34;&gt;CVE-2019-11036&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A read past allocated buffer vulnerability was discovered in the PHP5 programming language within the Exif image module.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-119-1 zookeeper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-119-1-zookeeper/</link>
      <pubDate>Fri, 24 May 2019 09:24:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-119-1-zookeeper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-119-1-zookeeper/">
      
&lt;p&gt;Package : zookeeper&lt;/p&gt;


&lt;p&gt;Version : 3.4.5&amp;#43;dfsg-2&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0201&#34;&gt;CVE-2019-0201&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was an information disclosure vulnerability in zookeeper, a distributed co-ordination server. Users who were not authorised to read data were able to view the access control list.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-118-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-118-1-wireshark/</link>
      <pubDate>Tue, 21 May 2019 10:01:32 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-118-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-118-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10894&#34;&gt;CVE-2019-10894&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10895&#34;&gt;CVE-2019-10895&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in wireshark, a network traffic analyzer.&lt;/p&gt;
&lt;p&gt;CVE-2019-10894: assertion failure leading to crash.&lt;/p&gt;
&lt;p&gt;CVE-2019-10895: large number of heap buffer overflows read and write in NetScaler trace handling.&lt;/p&gt;
&lt;p&gt;These vulnerabilities might be leveraged by remote attackers to cause denial of service (DoS) via a crafted packet or PCAP file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-117-1 apache2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-117-1-apache2/</link>
      <pubDate>Wed, 15 May 2019 20:23:02 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-117-1-apache2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-117-1-apache2/">
      
&lt;p&gt;Package : apache2&lt;/p&gt;


&lt;p&gt;Version : 2.2.22-13&amp;#43;deb7u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0217&#34;&gt;CVE-2019-0217&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-0220&#34;&gt;CVE-2019-0220&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2019-0217&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Simon Kappel discovered a race condition in mod_auth_digest when running in
a threaded server which could allow a user with valid credentials to
authenticate using another username, bypassing configured access control
restrictions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-0220&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Bernhard Lorenz of Alpha Strike Labs GmbH discovered a httpd URL
normalization inconsistincy when the path component of a request URL
contains multiple consecutive slashes (&#39;/&#39;), directives such as
LocationMatch and RewriteRule must account for duplicates in regular
expressions while other aspects of the servers processing will implicitly
collapse them.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-116-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-116-1-openjdk-7/</link>
      <pubDate>Fri, 10 May 2019 18:36:11 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-116-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-116-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u221-2.6.18-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2602&#34;&gt;CVE-2019-2602&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2684&#34;&gt;CVE-2019-2684&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2698&#34;&gt;CVE-2019-2698&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, information disclosure or the execution
of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-115-1 systemd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-115-1-systemd/</link>
      <pubDate>Tue, 30 Apr 2019 16:42:31 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-115-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-115-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 44-11&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18078&#34;&gt;CVE-2017-18078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3842&#34;&gt;CVE-2019-3842&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been addressed in the systemd components
systemd-tmpfiles and pam_systemd.so.&lt;/p&gt;
&lt;p&gt;CVE-2017-18078:
systemd-tmpfiles in systemd attempted to support ownership/permission
changes on hardlinked files even if the fs.protected_hardlinks sysctl
is turned off, which allowed local users to bypass intended access
restrictions via vectors involving a hard link to a file for which
the user lacked write access.&lt;/p&gt;
&lt;p&gt;CVE-2019-3842:
It was discovered that pam_systemd did not properly sanitize the
environment before using the XDG_SEAT variable. It was possible for
an attacker, in some particular configurations, to set a XDG_SEAT
environment variable which allowed for commands to be checked against
polkit policies using the &amp;ldquo;allow_active&amp;rdquo; element rather than
&amp;ldquo;allow_any&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-114-1 ruby1.9.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-114-1-ruby1.9.1/</link>
      <pubDate>Tue, 30 Apr 2019 10:11:29 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-114-1-ruby1.9.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-114-1-ruby1.9.1/">
      
&lt;p&gt;Package : ruby1.9.1&lt;/p&gt;


&lt;p&gt;Version : 1.9.3.194-8.1&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8320&#34;&gt;CVE-2019-8320&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8322&#34;&gt;CVE-2019-8322&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8323&#34;&gt;CVE-2019-8323&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-8325&#34;&gt;CVE-2019-8325&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in rubygems embedded in
ruby1.9.1, the interpreted scripting language.&lt;/p&gt;
&lt;p&gt;CVE-2019-8320:
A Directory Traversal issue was discovered in RubyGems. Before
making new directories or touching files (which now include
path-checking code for symlinks), it would delete the target
destination.&lt;/p&gt;
&lt;p&gt;CVE-2019-8322:
The gem owner command outputs the contents of the API response
directly to stdout. Therefore, if the response is crafted, escape
sequence injection may occur.&lt;/p&gt;
&lt;p&gt;CVE-2019-8323:
Gem::GemcutterUtilities#with_response may output the API response to
stdout as it is. Therefore, if the API side modifies the response,
escape sequence injection may occur.&lt;/p&gt;
&lt;p&gt;CVE-2019-8325:
Since Gem::CommandManager#run calls alert_error without escaping,
escape sequence injection is possible. (There are many ways to cause
an error.)&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-113-1 monit security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-113-1-monit/</link>
      <pubDate>Sat, 27 Apr 2019 11:24:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-113-1-monit/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-113-1-monit/">
      
&lt;p&gt;Package : monit&lt;/p&gt;


&lt;p&gt;Version : 1:5.4-2&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11454&#34;&gt;CVE-2019-11454&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11455&#34;&gt;CVE-2019-11455&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Zack Flack found several issues in monit, a utility for monitoring and managing daemons or similar programs.&lt;/p&gt;
&lt;p&gt;CVE-2019-11454:
An XSS vulnerabilitty has been reported that could be prevented by HTML escaping the log file content when viewed via Monit GUI.&lt;/p&gt;
&lt;p&gt;CVE-2019-11455:
A buffer overrun vulnerability has been reported in URL decoding.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-112-1 wget security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-112-1-wget/</link>
      <pubDate>Tue, 23 Apr 2019 23:16:44 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-112-1-wget/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-112-1-wget/">
      
&lt;p&gt;Package : wget&lt;/p&gt;


&lt;p&gt;Version : 1.13.4-3&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5953&#34;&gt;CVE-2019-5953&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Kusano Kazuhiko discovered a buffer overflow vulnerability in the handling of Internationalized Resource Identifiers (IRI) in wget, a network utility to retrieve files from the web, which could result in the execution of arbitrary code or denial of service when recursively downloading from an untrusted server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-111-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-111-1-linux/</link>
      <pubDate>Mon, 22 Apr 2019 23:56:50 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-111-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-111-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.64-2~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10741&#34;&gt;CVE-2016-10741&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5753&#34;&gt;CVE-2017-5753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13305&#34;&gt;CVE-2017-13305&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3639&#34;&gt;CVE-2018-3639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5848&#34;&gt;CVE-2018-5848&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5953&#34;&gt;CVE-2018-5953&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12896&#34;&gt;CVE-2018-12896&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13053&#34;&gt;CVE-2018-13053&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16862&#34;&gt;CVE-2018-16862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16884&#34;&gt;CVE-2018-16884&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17972&#34;&gt;CVE-2018-17972&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18281&#34;&gt;CVE-2018-18281&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18690&#34;&gt;CVE-2018-18690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18710&#34;&gt;CVE-2018-18710&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19824&#34;&gt;CVE-2018-19824&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19985&#34;&gt;CVE-2018-19985&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20169&#34;&gt;CVE-2018-20169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20511&#34;&gt;CVE-2018-20511&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3701&#34;&gt;CVE-2019-3701&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3819&#34;&gt;CVE-2019-3819&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-6974&#34;&gt;CVE-2019-6974&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7221&#34;&gt;CVE-2019-7221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7222&#34;&gt;CVE-2019-7222&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9213&#34;&gt;CVE-2019-9213&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2016-10741&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A race condition was discovered in XFS that would result in a
crash (BUG). A local user permitted to write to an XFS volume
could use this for denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-5753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Further instances of code that was vulnerable to Spectre variant 1
(bounds-check bypass) have been mitigated.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-13305&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory over-read was discovered in the keys subsystem&#39;s
encrypted key type. A local user could use this for denial of
service or possibly to read sensitive information.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-3639 (SSB)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers have discovered that Speculative Store Bypass
(SSB), a feature implemented in many processors, could be used to
read sensitive information from another context. In particular,
code in a software sandbox may be able to read sensitive
information from outside the sandbox. This issue is also known as
Spectre variant 4.

This update fixes bugs in the mitigations for SSB for AMD
processors.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5848&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The wil6210 wifi driver did not properly validate lengths in scan
and connection requests, leading to a possible buffer overflow.
On systems using this driver, a local user with the CAP_NET_ADMIN
capability could use this for denial of service (memory corruption
or crash) or potentially for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5953&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The swiotlb subsystem printed kernel memory addresses to the
system log, which could help a local attacker to exploit other
vulnerabilities.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-12896, CVE-2018-13053&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Team OWL337 reported possible integer overflows in the POSIX
timer implementation. These might have some security impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-16862&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vasily Averin and Pavel Tikhomirov from Virtuozzo Kernel Team
discovered that the cleancache memory management feature did not
invalidate cached data for deleted files. On Xen guests using the
tmem driver, local users could potentially read data from other
users&#39; deleted files if they were able to create new files on the
same volume.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-16884&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in the NFS 4.1 client implementation. Mounting
NFS shares in multiple network namespaces at the same time could
lead to a user-after-free. Local users might be able to use this
for denial of service (memory corruption or crash) or possibly
for privilege escalation.

This can be mitigated by disabling unprivileged users from
creating user namespaces, which is the default in Debian.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-17972&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported that the /proc/*/stack files in procfs leaked
sensitive data from the kernel. These files are now only readable
by users with the CAP_SYS_ADMIN capability (usually only root)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-18281&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a race condition in the virtual memory manager
that can result in a process briefly having access to memory after
it is freed and reallocated. A local user permitted to create
containers could possibly exploit this for denial of service
(memory corruption) or for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-18690&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Kanda Motohiro reported that XFS did not correctly handle some
xattr (extended attribute) writes that require changing the disk
format of the xattr. A user with access to an XFS volume could use
this for denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-18710&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the cdrom driver does not correctly
validate the parameter to the CDROM_SELECT_DISC ioctl. A user with
access to a cdrom device could use this to read sensitive
information from the kernel or to cause a denial of service
(crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19824&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hui Peng and Mathias Payer discovered a use-after-free bug in the
USB audio driver. A physically present attacker able to attach a
specially designed USB device could use this for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19985&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hui Peng and Mathias Payer discovered a missing bounds check in the
hso USB serial driver. A physically present user able to attach a
specially designed USB device could use this to read sensitive
information from the kernel or to cause a denial of service
(crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-20169&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Hui Peng and Mathias Payer discovered missing bounds checks in the
USB core. A physically present attacker able to attach a specially
designed USB device could use this to cause a denial of service
(crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-20511&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;InfoSect reported an information leak in the AppleTalk IP/DDP
implemntation. A local user with CAP_NET_ADMIN capability could
use this to read sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-3701&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Muyu Yu and Marcus Meissner reported that the CAN gateway
implementation allowed the frame length to be modified, typically
resulting in out-of-bounds memory-mapped I/O writes.  On a system
with CAN devices present, a local user with CAP_NET_ADMIN
capability in the initial net namespace could use this to cause a
crash (oops) or other hardware-dependent impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-3819&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A potential infinite loop was discovered in the HID debugfs
interface exposed under /sys/kernel/debug/hid. A user with access
to these files could use this for denial of service.

This interface is only accessible to root by default, which fully
mitigates the issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-6974&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported a use-after-free bug in KVM. A local user
with access to /dev/kvm could use this to cause a denial of
service (memory corruption or crash) or possibly for privilege
escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-7221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jim Mattson and Felix Wilhelm reported a user-after-free bug in
KVM&#39;s nested VMX implementation. On systems with Intel CPUs, a
local user with access to /dev/kvm could use this to cause a
denial of service (memory corruption or crash) or possibly for
privilege escalation.

Nested VMX is disabled by default, which fully mitigates the
issue.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-7222&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Felix Wilhelm reported an information leak in KVM for x86.
A local user with access to /dev/kvm could use this to read
sensitive information from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9213&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn reported that privileged tasks could cause stack
segments, including those in other processes, to grow downward to
address 0. On systems lacking SMAP (x86) or PAN (ARM), this
exacerbated other vulnerabilities: a null pointer dereference
could be exploited for privilege escalation rather than only for
denial of service.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-110-1 firmware-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-110-1-firmware-nonfree/</link>
      <pubDate>Mon, 22 Apr 2019 16:40:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-110-1-firmware-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-110-1-firmware-nonfree/">
      
&lt;p&gt;Package : firmware-nonfree&lt;/p&gt;


&lt;p&gt;Version : 20161130-5~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5383&#34;&gt;CVE-2018-5383&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Eli Biham and Lior Neumann discovered a cryptographic weakness in the
Bluetooth LE SC pairing protocol, called the Fixed Coordinate Invalid
Curve Attack (CVE-2018-5383).  Depending on the devices used, this
could be exploited by a nearby attacker to obtain sensitive
information, for denial of service, or for other security impact.&lt;/p&gt;
&lt;p&gt;This flaw has been fixed in firmware for Intel Wireless 7260 (B3),
7260 (B5), 7265 (D1), and 8264 adapters, and for Qualcomm Atheros
QCA61x4 &amp;ldquo;ROME&amp;rdquo; version 3.2 adapters.  Other Bluetooth adapters are
also affected and remain vulnerable.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-109-1 jquery security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-109-1-jquery/</link>
      <pubDate>Sat, 20 Apr 2019 17:02:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-109-1-jquery/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-109-1-jquery/">
      
&lt;p&gt;Package : jquery&lt;/p&gt;


&lt;p&gt;Version : 1.7.2&amp;#43;dfsg-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11358&#34;&gt;CVE-2019-11358&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;jQuery mishandles jQuery.extend(true, {}, &amp;hellip;) because of Object.prototype
pollution. If an unsanitized source object contained an enumerable &lt;strong&gt;proto&lt;/strong&gt;
property, it could extend the native Object.prototype.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-72-2 jasper regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-72-2-jasper/</link>
      <pubDate>Sat, 20 Apr 2019 16:40:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-72-2-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-72-2-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-13&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19542&#34;&gt;CVE-2018-19542&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The update of jasper issued as ELA-72-1 caused a regression due to
the fix for CVE-2018-19542, a NULL pointer dereference in the function
jp2_decode, which could lead to a denial-of-service. In some cases not
only invalid jp2 files but also valid jp2 files were rejected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-108-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-108-1-php5/</link>
      <pubDate>Fri, 19 Apr 2019 10:52:17 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-108-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-108-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1000019&#34;&gt;CVE-2019-1000019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1000020&#34;&gt;CVE-2019-1000020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two heap-buffer overflow vulnerabilities were discovered in the PHP5 programming language within the Exif image module.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-107-1 libxslt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-107-1-libxslt/</link>
      <pubDate>Tue, 16 Apr 2019 18:08:08 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-107-1-libxslt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-107-1-libxslt/">
      
&lt;p&gt;Package : libxslt&lt;/p&gt;


&lt;p&gt;Version : 1.1.26-14.1&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-11068&#34;&gt;CVE-2019-11068&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a authentication bypass vulnerability in
libxslt, a widely-used library for transforming files from XML to other
arbitrary format.&lt;/p&gt;
&lt;p&gt;This vulnerability was caused by invalid handling of xsltCheckRead and
xsltCheckWrite -1 error return value, handled as a success code. Remote
attackers could leverage this vulnerability to bypass protection mechanisms
and possibly cause unauthorized disclosure of information or modification.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-106-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-106-1-wireshark/</link>
      <pubDate>Sun, 14 Apr 2019 16:45:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-106-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-106-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u16&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10899&#34;&gt;CVE-2019-10899&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10901&#34;&gt;CVE-2019-10901&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-10903&#34;&gt;CVE-2019-10903&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in wireshark, a network traffic analyzer.&lt;/p&gt;
&lt;p&gt;CVE-2019-10899: heap based buffer under-read in the SRVLOC dissector.&lt;/p&gt;
&lt;p&gt;CVE-2019-10901: NULL pointer dereference in the LDSS dissector.&lt;/p&gt;
&lt;p&gt;CVE-2019-10903: missing boundary checks causing Resource Management Errors in the DCERPC SPOOLSS dissector.&lt;/p&gt;
&lt;p&gt;These vulnerabilities might be leveraged by remote attackers to cause denial of service (DoS) via a crafted packet or PCAP file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-105-1 sqlalchemy security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-105-1-sqlalchemy/</link>
      <pubDate>Wed, 10 Apr 2019 00:15:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-105-1-sqlalchemy/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-105-1-sqlalchemy/">
      
&lt;p&gt;Package : sqlalchemy&lt;/p&gt;


&lt;p&gt;Version : 0.7.8-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7164&#34;&gt;CVE-2019-7164&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7548&#34;&gt;CVE-2019-7548&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered in SQLALchemy, a Python SQL Toolkit and
Object Relational Mapper.&lt;/p&gt;
&lt;p&gt;CVE-2019-7164&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SQLAlchemy allows SQL Injection via the order_by parameter.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-7548&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SQLAlchemy allows SQL Injection when the group_by parameter can be controlled.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The SQLAlchemy project warns that these security fixes break the seldom-used
text coercion feature.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-104-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-104-1-samba/</link>
      <pubDate>Tue, 09 Apr 2019 22:41:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-104-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-104-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:3.6.6-6&amp;#43;deb7u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3880&#34;&gt;CVE-2019-3880&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A flaw was found in the way Samba implemented an RPC endpoint emulating
the Windows registry service API. An unprivileged attacker could have
used this flaw to create a new registry hive file anywhere they had unix
permissions which could have lead to creation of a new file in the Samba
share.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-99-2 libssh2 regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-99-2-libssh2/</link>
      <pubDate>Sat, 06 Apr 2019 20:12:36 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-99-2-libssh2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-99-2-libssh2/">
      
&lt;p&gt;Package : libssh2&lt;/p&gt;


&lt;p&gt;Version : 1.4.2-1.1&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3859&#34;&gt;CVE-2019-3859&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This regression update follows up on an upstream regression update [1] regarding CVE-2019-3859.&lt;/p&gt;
&lt;p&gt;With the previous libssh2 package revision, it was observed that user authentication with private/public key pairs would fail under certain circumstances.&lt;/p&gt;
&lt;p&gt;[1] &lt;a href=&#34;https://github.com/libssh2/libssh2/pull/327&#34;&gt;https://github.com/libssh2/libssh2/pull/327&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-103-1 cron security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-103-1-cron/</link>
      <pubDate>Mon, 01 Apr 2019 13:10:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-103-1-cron/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-103-1-cron/">
      
&lt;p&gt;Package : cron&lt;/p&gt;


&lt;p&gt;Version : 3.0pl1-124&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9525&#34;&gt;CVE-2017-9525&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9704&#34;&gt;CVE-2019-9704&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9705&#34;&gt;CVE-2019-9705&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9706&#34;&gt;CVE-2019-9706&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Various security problems have been discovered in Debian&amp;rsquo;s CRON scheduler.&lt;/p&gt;
&lt;p&gt;CVE-2017-9525: Fix group crontab to root escalation via the Debian
package&amp;rsquo;s postinst script as described by Alexander Peslyak (Solar
Designer) in &lt;a href=&#34;http://www.openwall.com/lists/oss-security/2017/06/08/3&#34;&gt;http://www.openwall.com/lists/oss-security/2017/06/08/3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;CVE-2019-9704: DoS: Fix unchecked return of calloc(). Florian Weimer
discovered that a missing check for the return value of calloc() could
crash the daemon, which could be triggered by a very large crontab
created by a user.&lt;/p&gt;
&lt;p&gt;CVE-2019-9705: Enforce maximum crontab line count of 1000 to prevent a
malicious user from creating an excessivly large crontab. The daemon will
log a warning for existing files, and crontab(1) will refuse to create
new ones.&lt;/p&gt;
&lt;p&gt;CVE-2019-9706: A user reported a use-after-free condition in the cron
daemon, leading to a possible Denial-of-Service scenario by crashing the
daemon.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-102-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-102-1-libdatetime-timezone-perl/</link>
      <pubDate>Mon, 01 Apr 2019 12:10:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-102-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-102-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.58-1&amp;#43;2019a&lt;/p&gt;


      &lt;p&gt;This update brings the Olson database changes from the 2019a version to
the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-101-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-101-1-tzdata/</link>
      <pubDate>Mon, 01 Apr 2019 12:08:14 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-101-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-101-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2019a-0&amp;#43;deb7u1&lt;/p&gt;


      &lt;p&gt;This update brings the timezone changes from the upstream 2019a release.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-100-1 tiff3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-100-1-tiff3/</link>
      <pubDate>Thu, 28 Mar 2019 12:23:53 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-100-1-tiff3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-100-1-tiff3/">
      
&lt;p&gt;Package : tiff3&lt;/p&gt;


&lt;p&gt;Version : 3.9.6-11&amp;#43;deb7u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5360&#34;&gt;CVE-2018-5360&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been discovered in tiff3, an older implementation of
the libtiff library providing support for the Tag Image File Format
(TIFF), a widely used format for storing image data.  Mishandling the
reading of TIFF files has been demonstrated by a heap-based buffer
over-read in the ReadTIFFImage function in coders/tiff.c in
GraphicsMagick.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-99-1 libssh2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-99-1-libssh2/</link>
      <pubDate>Wed, 27 Mar 2019 20:26:32 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-99-1-libssh2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-99-1-libssh2/">
      
&lt;p&gt;Package : libssh2&lt;/p&gt;


&lt;p&gt;Version : 1.4.2-1.1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3855&#34;&gt;CVE-2019-3855&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3856&#34;&gt;CVE-2019-3856&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3857&#34;&gt;CVE-2019-3857&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3858&#34;&gt;CVE-2019-3858&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3859&#34;&gt;CVE-2019-3859&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3860&#34;&gt;CVE-2019-3860&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3861&#34;&gt;CVE-2019-3861&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3862&#34;&gt;CVE-2019-3862&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3863&#34;&gt;CVE-2019-3863&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have recently been discovered in libssh2, a
client-side C library implementing the SSH2 protocol&lt;/p&gt;
&lt;p&gt;CVE-2019-3855:
An integer overflow flaw which could have lead to an out of bounds
write was discovered in libssh2 in the way packets were read from the
server. A remote attacker who compromised an SSH server could have
been able to execute code on the client system when a user connected
to the server.&lt;/p&gt;
&lt;p&gt;CVE-2019-3856:
An integer overflow flaw, which could have lead to an out of bounds
write, was discovered in libssh2 in the way keyboard prompt requests
were parsed. A remote attacker who compromised an SSH server could have
been able to execute code on the client system when a user connected
to the server.&lt;/p&gt;
&lt;p&gt;CVE-2019-3857:
An integer overflow flaw which could have lead to an out of bounds
write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST
packets with an exit signal were parsed. A remote attacker who
compromises an SSH server could have been able to execute code on the
client system when a user connected to the server.&lt;/p&gt;
&lt;p&gt;CVE-2019-3858:
An out of bounds read flaw was discovered in libssh2 when a specially
crafted SFTP packet was received from the server. A remote attacker
who compromised an SSH server could have been able to cause a Denial
of Service or read data in the client memory.&lt;/p&gt;
&lt;p&gt;CVE-2019-3859:
An out of bounds read flaw was discovered in libssh2&amp;rsquo;s
_libssh2_packet_require and _libssh2_packet_requirev functions. A
remote attacker who compromised an SSH server could have be able to
cause a Denial of Service or read data in the client memory.&lt;/p&gt;
&lt;p&gt;CVE-2019-3860:
An out of bounds read flaw was discovered in libssh2 in the way SFTP
packets with empty payloads were parsed. A remote attacker who
compromised an SSH server could have be able to cause a Denial of
Service or read data in the client memory.&lt;/p&gt;
&lt;p&gt;CVE-2019-3861:
An out of bounds read flaw was discovered in libssh2 in the way SSH
packets with a padding length value greater than the packet length
were parsed. A remote attacker who compromised a SSH server could
have been able to cause a Denial of Service or read data in the
client memory.&lt;/p&gt;
&lt;p&gt;CVE-2019-3862:
An out of bounds read flaw was discovered in libssh2 in the way
SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no
payload were parsed. A remote attacker who compromised an SSH server
could have been able to cause a Denial of Service or read data in the
client memory.&lt;/p&gt;
&lt;p&gt;CVE-2019-3863:
A server could have sent multiple keyboard interactive response
messages whose total length were greater than unsigned char max
characters. This value was used as an index to copy memory causing
an out of bounds memory write error.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-98-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-98-1-openjdk-7/</link>
      <pubDate>Wed, 27 Mar 2019 10:44:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-98-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-98-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u211-2.6.17-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-2422&#34;&gt;CVE-2019-2422&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A memory disclosure vulnerability was discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in information
disclosure or bypass of sandbox restrictions.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-97-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-97-1-wireshark/</link>
      <pubDate>Mon, 25 Mar 2019 20:27:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-97-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-97-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u15&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9344&#34;&gt;CVE-2017-9344&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9349&#34;&gt;CVE-2017-9349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9209&#34;&gt;CVE-2019-9209&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been found in wireshark, a network traffic analyzer.&lt;/p&gt;
&lt;p&gt;CVE-2019-9209:
Preventing the crash of the ASN.1 BER and related dissectors by
avoiding a buffer overflow associated with excessive digits in
time values.&lt;/p&gt;
&lt;p&gt;CVE-2017-9349:
Fixing an infinite loop in the DICOM dissector by validationg
a length value.&lt;/p&gt;
&lt;p&gt;CVE-2017-9344:
Avoid a divide by zero, by validating an interval value in the
Bluetooth L2CAP dissector.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-96-1 bash security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-96-1-bash/</link>
      <pubDate>Mon, 25 Mar 2019 12:56:01 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-96-1-bash/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-96-1-bash/">
      
&lt;p&gt;Package : bash&lt;/p&gt;


&lt;p&gt;Version : 4.2&amp;#43;dfsg-0.1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9401&#34;&gt;CVE-2016-9401&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9924&#34;&gt;CVE-2019-9924&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been fixed in bash, the GNU Bourne-Again Shell:&lt;/p&gt;
&lt;p&gt;CVE-2016-9401&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The popd builtin segfaulted when called with negative out of range
offsets.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9924&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sylvain Beucler discovered that it was possible to call commands
that contained a slash when in restricted mode (rbash) by adding
them to the BASH_CMDS array.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-95-1 rsync security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-95-1-rsync/</link>
      <pubDate>Sun, 24 Mar 2019 22:51:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-95-1-rsync/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-95-1-rsync/">
      
&lt;p&gt;Package : rsync&lt;/p&gt;


&lt;p&gt;Version : 3.0.9-4&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9840&#34;&gt;CVE-2016-9840&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9841&#34;&gt;CVE-2016-9841&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-9843&#34;&gt;CVE-2016-9843&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Trail of Bits used the automated vulnerability discovery tools developed
for the DARPA Cyber Grand Challenge to audit zlib. As rsync, a fast,
versatile, remote (and local) file-copying tool, uses an embedded copy of
zlib, those issues are also present in rsync.&lt;/p&gt;
&lt;p&gt;CVE-2016-9840
In order to avoid undefined behavior, remove offset pointer
optimization, as this is not compliant with the C standard.&lt;/p&gt;
&lt;p&gt;CVE-2016-9841
Only use post-increment to be compliant with the C standard.&lt;/p&gt;
&lt;p&gt;CVE-2016-9843
In order to avoid undefined behavior, do not pre-decrement a pointer
in big-endian CRC calculation, as this is not compliant with the
C standard.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-94-1 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-94-1-openssh/</link>
      <pubDate>Wed, 20 Mar 2019 14:33:33 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-94-1-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-94-1-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:6.0p1-4&amp;#43;deb7u11&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20685&#34;&gt;CVE-2018-20685&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-6109&#34;&gt;CVE-2019-6109&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-6111&#34;&gt;CVE-2019-6111&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Harry Sintonen from F-Secure Corporation discovered multiple vulnerabilities in
OpenSSH, an implementation of the SSH protocol suite. All the vulnerabilities
are found in the scp client implementing the SCP protocol.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CVE-2018-20685

Due to improper directory name validation, the scp client allows servers to
modify permissions of the target directory by using empty or dot directory
name.

CVE-2019-6109

Due to missing character encoding in the progress display, the object name
can be used to manipulate the client output, for example to employ ANSI
codes to hide additional files being transferred.

CVE-2019-6111

Due to scp client insufficient input validation in path names sent by
the server, a malicious server can do arbitrary file overwrites in target
directory. If the recursive (-r) option is provided, the server can also
manipulate subdirectories as well.

The check added in this version can lead to a regression if the client and
the server behave differently in wildcard expansion rules. If the server is
trusted for that purpose, the check can be disabled with a new -T option to
the scp client.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-93-1 libsndfile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-93-1-libsndfile/</link>
      <pubDate>Wed, 13 Mar 2019 13:56:58 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-93-1-libsndfile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-93-1-libsndfile/">
      
&lt;p&gt;Package : libsndfile&lt;/p&gt;


&lt;p&gt;Version : 1.0.25-9.1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3832&#34;&gt;CVE-2019-3832&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was found that the fix for CVE-2018-19758 was incomplete. That
has been addressed in this update. For completeness, the description
for CVE-2018-19758 follows:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-buffer-overflow vulnerability was discovered in libsndfile, the
library for reading and writing files containing sampled sound. This flaw
might be triggered by remote attackers to cause denial of service (out of
bounds read and application crash).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-92-1 xmltooling security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-92-1-xmltooling/</link>
      <pubDate>Wed, 13 Mar 2019 13:22:46 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-92-1-xmltooling/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-92-1-xmltooling/">
      
&lt;p&gt;Package : xmltooling&lt;/p&gt;


&lt;p&gt;Version : 1.4.2-5&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9628&#34;&gt;CVE-2019-9628&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Ross Geerlings discovered that the XMLTooling library did not correctly handle
exceptions for malformed XML declarations, which could result in denial of
service against the application using XMLTooling.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-91-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-91-1-php5/</link>
      <pubDate>Sun, 10 Mar 2019 04:05:35 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-91-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-91-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9637&#34;&gt;CVE-2019-9637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9638&#34;&gt;CVE-2019-9638&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9639&#34;&gt;CVE-2019-9639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9640&#34;&gt;CVE-2019-9640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9641&#34;&gt;CVE-2019-9641&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities have been discovered in php5, a server-side,
HTML-embedded scripting language.  Note that this update includes a
change to the default behavior for IMAP connections.  See below for
details.&lt;/p&gt;
&lt;p&gt;CVE-2019-9637&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;rename() across the device may allow unwanted access during processing
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9638 CVE-2019-9639&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Uninitialized read in exif_process_IFD_in_MAKERNOTE
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9640&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Invalid Read on exif_process_SOFn
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2019-9641&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Uninitialized read in exif_process_IFD_in_TIFF
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-90-1 libsdl1.2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-90-1-libsdl1.2/</link>
      <pubDate>Wed, 06 Mar 2019 20:43:08 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-90-1-libsdl1.2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-90-1-libsdl1.2/">
      
&lt;p&gt;Package : libsdl1.2&lt;/p&gt;


&lt;p&gt;Version : 1.2.15-5&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7572&#34;&gt;CVE-2019-7572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7573&#34;&gt;CVE-2019-7573&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7574&#34;&gt;CVE-2019-7574&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7575&#34;&gt;CVE-2019-7575&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7576&#34;&gt;CVE-2019-7576&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7577&#34;&gt;CVE-2019-7577&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7578&#34;&gt;CVE-2019-7578&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7635&#34;&gt;CVE-2019-7635&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7636&#34;&gt;CVE-2019-7636&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7637&#34;&gt;CVE-2019-7637&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7638&#34;&gt;CVE-2019-7638&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several heap-based buffer overflow vulnerabilities were discovered in the
Simple DirectMedia Layer library which may lead to information disclosure,
memory corruption, denial-of-service or other unspecified impact when input
is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-89-1 nss security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-89-1-nss/</link>
      <pubDate>Tue, 05 Mar 2019 03:17:03 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-89-1-nss/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-89-1-nss/">
      
&lt;p&gt;Package : nss&lt;/p&gt;


&lt;p&gt;Version : 2:3.26-1&amp;#43;debu7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12404&#34;&gt;CVE-2018-12404&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18508&#34;&gt;CVE-2018-18508&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities have been discovered in nss, the Mozilla Network
Security Service library.&lt;/p&gt;
&lt;p&gt;CVE-2018-12404&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Cache side-channel variant of the Bleichenbacher attack
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-18508&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference in several CMS functions resulting in a
denial of service
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-88-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-88-1-openssl/</link>
      <pubDate>Sun, 03 Mar 2019 18:00:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-88-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-88-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1559&#34;&gt;CVE-2019-1559&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Juraj Somorovsky, Robert Merget and Nimrod Aviram discovered a padding
oracle attack in OpenSSL.
If an application encounters a fatal protocol error and then calls
SSL_shutdown() twice (once to send a close_notify, and once to receive one)
then OpenSSL can respond differently to the calling application if a 0 byte
record is received with invalid padding compared to if a 0 byte record is
received with an invalid MAC. If the application then behaves differently
based on that in a way that is detectable to the remote peer, then this
amounts to a padding oracle that could be used to decrypt data.&lt;/p&gt;
&lt;p&gt;In order for this to be exploitable &amp;ldquo;non-stitched&amp;rdquo; ciphersuites must be in
use. Stitched ciphersuites are optimised implementations of certain
commonly used ciphersuites. Also the application must call SSL_shutdown()
twice even if a protocol error has occurred (applications should not do
this but some do anyway). AEAD ciphersuites are not impacted.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-87-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-87-1-bind9/</link>
      <pubDate>Thu, 28 Feb 2019 20:30:36 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-87-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-87-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.8.4.dfsg.P1-6&amp;#43;nmu2&amp;#43;deb7u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5745&#34;&gt;CVE-2018-5745&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-6465&#34;&gt;CVE-2019-6465&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two issues have been found in bind9, the Internet Domain Name Server.&lt;/p&gt;
&lt;p&gt;CVE-2019-6465: Zone transfer for DLZs are executed though not permitted by ACLs.&lt;/p&gt;
&lt;p&gt;CVE-2018-5745: Avoid assertion and thus causing named to deliberately exit when a trust anchor&amp;rsquo;s key is replaced with a key which uses an unsupported algorithm.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-86-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-86-1-php5/</link>
      <pubDate>Wed, 27 Feb 2019 22:15:21 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-86-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-86-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20783&#34;&gt;CVE-2018-20783&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000888&#34;&gt;CVE-2018-1000888&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9022&#34;&gt;CVE-2019-9022&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues in php5 have been fixed to avoid access to illegal memory.&lt;/p&gt;
&lt;p&gt;CVE-2019-9022:
An issue during parsing of DNS responses allows a hostile DNS server
to misuse memcpy, which leads to a read operation past an allocated
buffer.&lt;/p&gt;
&lt;p&gt;CVE-2018-1000888:
Fix for a PHP object injection vulnerability in the PEAR Archive_tar
code, potentially allowing a remote attacker to execute arbitrary code.&lt;/p&gt;
&lt;p&gt;CVE-2018-20783:
buffer over-read in PHAR reading functions may give an attacker access
to memory past the actual data when trying to parse a .phar file&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-85-1 elfutils security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-85-1-elfutils/</link>
      <pubDate>Mon, 25 Feb 2019 20:24:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-85-1-elfutils/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-85-1-elfutils/">
      
&lt;p&gt;Package : elfutils&lt;/p&gt;


&lt;p&gt;Version : 0.152-1&amp;#43;wheezy2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7608&#34;&gt;CVE-2017-7608&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7610&#34;&gt;CVE-2017-7610&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7611&#34;&gt;CVE-2017-7611&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7612&#34;&gt;CVE-2017-7612&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7613&#34;&gt;CVE-2017-7613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16062&#34;&gt;CVE-2018-16062&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18310&#34;&gt;CVE-2018-18310&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18520&#34;&gt;CVE-2018-18520&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18521&#34;&gt;CVE-2018-18521&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7149&#34;&gt;CVE-2019-7149&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7150&#34;&gt;CVE-2019-7150&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-7665&#34;&gt;CVE-2019-7665&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues in elfutils, a collection of utilities to handle ELF objects, have been found either by fuzzing or by using an AddressSanitizer.&lt;/p&gt;
&lt;p&gt;CVE-2019-7665
Due to a heap-buffer-overflow problem in function elf32_xlatetom()
a crafted ELF input can cause segmentation faults.&lt;/p&gt;
&lt;p&gt;CVE-2019-7150
Add sanity check for partial core file dynamic data read.&lt;/p&gt;
&lt;p&gt;CVE-2019-7149
Due to a heap-buffer-overflow problem in function read_srclines()
a crafted ELF input can cause segmentation faults.&lt;/p&gt;
&lt;p&gt;CVE-2018-18521
By using a crafted ELF file, containing a zero sh_entsize, a
divide-by-zero vulnerability could allow remote attackers to
cause a denial of service (application crash).&lt;/p&gt;
&lt;p&gt;CVE-2018-18520
By fuzzing an Invalid Address Deference problem in function elf_end
has been found.&lt;/p&gt;
&lt;p&gt;CVE-2018-18310
By fuzzing an Invalid Address Read problem in eu-stack has been found.&lt;/p&gt;
&lt;p&gt;CVE-2018-16062
By using an AddressSanitizer a heap-buffer-overflow has been found.&lt;/p&gt;
&lt;p&gt;CVE-2017-7613
By using fuzzing it was found that an allocation failure was not
handled properly.&lt;/p&gt;
&lt;p&gt;CVE-2017-7612
By using a crafted ELF file, containing an invalid sh_entsize, a
remote attackers could cause a denial of service (application crash).&lt;/p&gt;
&lt;p&gt;CVE-2017-7611
By using a crafted ELF file a remote attackers could cause a denial
of service (application crash).&lt;/p&gt;
&lt;p&gt;CVE-2017-7610
By using a crafted ELF file a remote attackers could cause a denial
of service (application crash).&lt;/p&gt;
&lt;p&gt;CVE-2017-7608
By fuzzing a heap based buffer overflow has been detected.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-84-1 gnutls26 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-84-1-gnutls26/</link>
      <pubDate>Mon, 25 Feb 2019 20:02:02 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-84-1-gnutls26/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-84-1-gnutls26/">
      
&lt;p&gt;Package : gnutls26&lt;/p&gt;


&lt;p&gt;Version : 2.12.20-8&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7869&#34;&gt;CVE-2017-7869&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5335&#34;&gt;CVE-2017-5335&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5336&#34;&gt;CVE-2017-5336&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5337&#34;&gt;CVE-2017-5337&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;pre&gt;&lt;code&gt;GNUTLS-SA-2017-2: CVE-2017-5335, CVE-2017-5336, CVE-2017-5337

It was found that decoding a specially crafted OpenPGP certificate could
lead to heap and stack overflows. This may cause a denial-of-service
(out-of-memory error and crash) or lead to other unspecified impact by
remote attackers. This affects only applications which utilize the OpenPGP
certificate functionality of GnuTLS.

CVE-2017-7869

It was found that decoding a specially crafted OpenPGP certificate could
lead to (A) an integer overflow, resulting in an invalid memory write, (B)
a null pointer dereference resulting in a server crash, and (C) a large
allocation, resulting in a server out-of-memory condition. These affect
only applications which utilize the OpenPGP certificate functionality of
GnuTLS.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-83-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-83-1-php5/</link>
      <pubDate>Mon, 11 Feb 2019 10:53:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-83-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-83-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9020&#34;&gt;CVE-2019-9020&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9021&#34;&gt;CVE-2019-9021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9023&#34;&gt;CVE-2019-9023&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-9024&#34;&gt;CVE-2019-9024&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several heap-based buffer overflows were found in PHP, the widely-used
general-purpose scripting language, which may lead to information disclosure,
memory corruption or other unspecified impact if a malformed file or other
input is processed.&lt;/p&gt;
&lt;p&gt;At the moment no CVE numbers have been assigned yet but PHP upstream intends to
announce them later.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-82-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-82-1-libarchive/</link>
      <pubDate>Thu, 07 Feb 2019 16:24:53 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-82-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-82-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.0.4-3&amp;#43;wheezy6&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1000019&#34;&gt;CVE-2019-1000019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-1000020&#34;&gt;CVE-2019-1000020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities were discovered and corrected in the
&lt;a href=&#34;http://libarchive.github.com/&#34;&gt;libarchive&lt;/a&gt; multi-format compression library,
first fixing an issue where a specially-crafted &lt;a href=&#34;https://www.7-zip.org/&#34;&gt;.z7ip&lt;/a&gt;
file could cause a denial-of-service attack via a crash (CVE-2019-1000019) in
addition to an endless-loop vulnerability where a malicious
&lt;a href=&#34;https://en.wikipedia.org/wiki/ISO_9660&#34;&gt;ISO9660&lt;/a&gt; image could cause an infinite
loop (CVE-2019-1000020).&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-81-1 systemd security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-81-1-systemd/</link>
      <pubDate>Fri, 01 Feb 2019 00:56:00 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-81-1-systemd/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-81-1-systemd/">
      
&lt;p&gt;Package : systemd&lt;/p&gt;


&lt;p&gt;Version : 44-11&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1049&#34;&gt;CVE-2018-1049&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-15686&#34;&gt;CVE-2018-15686&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-15686&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn of Google discovered a vulnerability in unit_deserialize of
systemd that allows a local attacker to supply arbitrary state across
systemd re-execution via NotifyAccess. This can be used to improperly
influence systemd execution and possibly lead to root privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1049&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In systemd exists a race condition between .mount and .automount units such
that automount requests from kernel may not be serviced by systemd
resulting in kernel holding the mountpoint and any processes that try to
use said mount will hang. A race condition like this may lead to denial of
service, until mount points are unmounted.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-80-1 libsndfile security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-80-1-libsndfile/</link>
      <pubDate>Thu, 31 Jan 2019 16:41:07 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-80-1-libsndfile/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-80-1-libsndfile/">
      
&lt;p&gt;Package : libsndfile&lt;/p&gt;


&lt;p&gt;Version : 1.0.25-9.1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14245&#34;&gt;CVE-2017-14245&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14246&#34;&gt;CVE-2017-14246&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14634&#34;&gt;CVE-2017-14634&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17456&#34;&gt;CVE-2017-17456&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17457&#34;&gt;CVE-2017-17457&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13139&#34;&gt;CVE-2018-13139&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19661&#34;&gt;CVE-2018-19661&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19662&#34;&gt;CVE-2018-19662&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19758&#34;&gt;CVE-2018-19758&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were found in libsndfile, a library for
reading and writing files containing sampled sound, that could
cause denial of service or other unspecified impact via crafted
input files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-79-1 spice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-79-1-spice/</link>
      <pubDate>Wed, 30 Jan 2019 17:30:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-79-1-spice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-79-1-spice/">
      
&lt;p&gt;Package : spice&lt;/p&gt;


&lt;p&gt;Version : 0.11.0-1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3813&#34;&gt;CVE-2019-3813&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Christophe Fergeau of RedHat found an off-by-one error in spice, a
SPICE protocol client and server library, that leads to an out of
bounds read, which can be exploited by a malicious client to cause
denial of service or arbitrary code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-78-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-78-1-wireshark/</link>
      <pubDate>Mon, 28 Jan 2019 22:54:45 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-78-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-78-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u14&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5716&#34;&gt;CVE-2019-5716&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5717&#34;&gt;CVE-2019-5717&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-5719&#34;&gt;CVE-2019-5719&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues in wireshark, a network traffic analyzer, have been found.
Dissectors of&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ISAKMP, a Internet Security Association and Key Management Protocol&lt;/li&gt;
&lt;li&gt;P_MUL, a reliable multicast transfer protocol&lt;/li&gt;
&lt;li&gt;6LoWPAN, IPv6 over Low power Wireless Personal Area Network
are affected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CVE-2019-5719
Mateusz Jurczyk found that a missing encryption block in a packet could crash the ISAKMP dissector.&lt;/p&gt;
&lt;p&gt;CVE-2019-5717
It was found that the P_MUL dissector could crash when a malformed packet contains an illegal Data PDU sequence number of 0.  Such a packet may not be analysed.&lt;/p&gt;
&lt;p&gt;CVE-2019-5716
It was found that the 6LoWPAN dissector could crash when a malformed packet does not contain IPHC information though the header says it should.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-77-1 krb5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-77-1-krb5/</link>
      <pubDate>Fri, 25 Jan 2019 19:57:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-77-1-krb5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-77-1-krb5/">
      
&lt;p&gt;Package : krb5&lt;/p&gt;


&lt;p&gt;Version : 1.10.1&amp;#43;dfsg-5&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-2694&#34;&gt;CVE-2015-2694&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5729&#34;&gt;CVE-2018-5729&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5730&#34;&gt;CVE-2018-5730&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20217&#34;&gt;CVE-2018-20217&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;krb5, a MIT Kerberos implementation had several flaws in LDAP DN checking, which could be used to circumvent a DN containership check by supplying special parameters to some calls. Further an attacker could crash the KDC by making S4U2Self requests.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-76-1 apt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-76-1-apt/</link>
      <pubDate>Tue, 22 Jan 2019 21:08:30 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-76-1-apt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-76-1-apt/">
      
&lt;p&gt;Package : apt&lt;/p&gt;


&lt;p&gt;Version : 0.9.7.9&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2019-3462&#34;&gt;CVE-2019-3462&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The HTTP redirects handling code did not properly sanitise fields transmitted
over the wire. This vulnerability could be used by an man-in-the-middle
attacker between APT and a mirror to inject malicious content in the HTTP
connection. This content would then be recognised as a valid package by APT and
used later for potential code execution with root privileges on the target
machine.&lt;/p&gt;
&lt;p&gt;Since the vulnerability is present in the package manager itself it is
recommended to disable redirects in order to prevent exploitation (during
this upgrade only):&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;apt -o Acquire::http::AllowRedirect=false update
apt -o Acquire::http::AllowRedirect=false upgrade
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-75-1 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-75-1-wireshark/</link>
      <pubDate>Sun, 20 Jan 2019 16:47:19 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-75-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-75-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7703&#34;&gt;CVE-2017-7703&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7746&#34;&gt;CVE-2017-7746&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-7747&#34;&gt;CVE-2017-7747&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9766&#34;&gt;CVE-2017-9766&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11406&#34;&gt;CVE-2017-11406&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11407&#34;&gt;CVE-2017-11407&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11409&#34;&gt;CVE-2017-11409&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13765&#34;&gt;CVE-2017-13765&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15191&#34;&gt;CVE-2017-15191&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17935&#34;&gt;CVE-2017-17935&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-17997&#34;&gt;CVE-2017-17997&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7325&#34;&gt;CVE-2018-7325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7331&#34;&gt;CVE-2018-7331&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9256&#34;&gt;CVE-2018-9256&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9259&#34;&gt;CVE-2018-9259&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9262&#34;&gt;CVE-2018-9262&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11356&#34;&gt;CVE-2018-11356&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11357&#34;&gt;CVE-2018-11357&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11359&#34;&gt;CVE-2018-11359&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16057&#34;&gt;CVE-2018-16057&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16058&#34;&gt;CVE-2018-16058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19622&#34;&gt;CVE-2018-19622&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19623&#34;&gt;CVE-2018-19623&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19624&#34;&gt;CVE-2018-19624&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19625&#34;&gt;CVE-2018-19625&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19626&#34;&gt;CVE-2018-19626&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues in wireshark, a tool that captures and analyzes packets off the wire, have been found by different people. These are basically issues with length checks or invalid memory access in different dissectors. This could result in infinite loops or crashes by malicious packets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-74-1 sqlite3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-74-1-sqlite3/</link>
      <pubDate>Wed, 09 Jan 2019 14:33:43 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-74-1-sqlite3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-74-1-sqlite3/">
      
&lt;p&gt;Package : sqlite3&lt;/p&gt;


&lt;p&gt;Version : 3.7.13-1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-2518&#34;&gt;CVE-2017-2518&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8740&#34;&gt;CVE-2018-8740&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20346&#34;&gt;CVE-2018-20346&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-8740&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sqlite3 is vulnerable to a NULL pointer dereference when using databases
that have been corrupted with &#39;CREATE TABLE AS&#39; statements. An attacker
could exploit this with a crafted database file to trigger a crash and
resulting denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-20346&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An attacker who is able to run arbitrary SQL statements could use this flaw
to corrupt the internal databases when the FTS3 extension is enabled, which
can lead to arbitrary code execution as the user running sqlite.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-2518&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free vulnerability may allow remote attackers to execute
arbitrary code or cause a denial of service (buffer overflow and
application crash) via a crafted SQL statement.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-73-1 libcaca security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-73-1-libcaca/</link>
      <pubDate>Sat, 05 Jan 2019 19:01:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-73-1-libcaca/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-73-1-libcaca/">
      
&lt;p&gt;Package : libcaca&lt;/p&gt;


&lt;p&gt;Version : 0.99.beta18-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20544&#34;&gt;CVE-2018-20544&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20546&#34;&gt;CVE-2018-20546&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20547&#34;&gt;CVE-2018-20547&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20549&#34;&gt;CVE-2018-20549&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in libcaca, a graphics library that
outputs text: integer overflows, floating point exceptions or invalid memory
reads may lead to a denial-of-service (application crash) if a malformed image
file is processed.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-72-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-72-1-jasper/</link>
      <pubDate>Thu, 03 Jan 2019 18:55:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-72-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-72-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-13&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19540&#34;&gt;CVE-2018-19540&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19541&#34;&gt;CVE-2018-19541&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20570&#34;&gt;CVE-2018-20570&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20584&#34;&gt;CVE-2018-20584&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20622&#34;&gt;CVE-2018-20622&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several flaws were corrected in Jasper, a JPEG 2000 image library. Heap-based
buffer overflows may lead to memory corruption, the exposure of sensitive
information or the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-71-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-71-1-libdatetime-timezone-perl/</link>
      <pubDate>Wed, 02 Jan 2019 18:37:55 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-71-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-71-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.58-1&amp;#43;2018i&lt;/p&gt;


      &lt;p&gt;This update brings the Olson database changes from the 2018i version to
the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-70-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-70-1-tzdata/</link>
      <pubDate>Wed, 02 Jan 2019 18:34:30 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-70-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-70-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2018i-0&amp;#43;deb7u1&lt;/p&gt;


      &lt;p&gt;This update brings the timezone changes from the upstream 2018i release.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-69-1 tar security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-69-1-tar/</link>
      <pubDate>Mon, 31 Dec 2018 10:23:12 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-69-1-tar/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-69-1-tar/">
      
&lt;p&gt;Package : tar&lt;/p&gt;


&lt;p&gt;Version : 1.26&amp;#43;dfsg-0.1&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-20482&#34;&gt;CVE-2018-20482&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A denial of service vulnerability was discovered in tar,
the GNU version of the tar UNIX archiving utility.&lt;/p&gt;
&lt;p&gt;The &amp;ndash;sparse argument looped endlessly if the file shrank
whilst it was being read. Tar would only break out of this
endless loop if the file grew again to (or beyond) its
original end of file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-68-1 libapache-mod-jk security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-68-1-libapache-mod-jk/</link>
      <pubDate>Mon, 17 Dec 2018 21:42:02 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-68-1-libapache-mod-jk/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-68-1-libapache-mod-jk/">
      
&lt;p&gt;Package : libapache-mod-jk&lt;/p&gt;


&lt;p&gt;Version : 1.2.46-0&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11759&#34;&gt;CVE-2018-11759&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been discovered in libapache-mod-jk, the Apache 2
connector for the Tomcat Java servlet engine.&lt;/p&gt;
&lt;p&gt;The libapache-mod-jk connector is susceptible to information disclosure
and privilege escalation because of a mishandling of URL normalization.&lt;/p&gt;
&lt;p&gt;The nature of the fix required that libapache-mod-jk in Debian 7
&amp;ldquo;Wheezy&amp;rdquo; be updated to the latest upstream release.  For reference, the
upstream changes associated with each release version are documented
here:&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html&#34;&gt;http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-67-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-67-1-php5/</link>
      <pubDate>Mon, 17 Dec 2018 02:34:31 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-67-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-67-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19518&#34;&gt;CVE-2018-19518&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19935&#34;&gt;CVE-2018-19935&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Vulnerabilities have been discovered in php5, a server-side,
HTML-embedded scripting language.  Note that this update includes a
change to the default behavior for IMAP connections.  See below for
details.&lt;/p&gt;
&lt;p&gt;CVE-2018-19518&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An argument injection vulnerability in imap_open() may allow a
remote attacker to execute arbitrary OS commands on the IMAP server.

The fix to the CVE-2018-19518 vulnerability included this
additional note from the upstream developers:

Starting with 5.6.38, rsh/ssh logins are disabled by default. Use
imap.enable_insecure_rsh if you want to enable them. Note that the
IMAP library does not filter mailbox names before passing them to
rsh/ssh command, thus passing untrusted data to this function with
rsh/ssh enabled is insecure.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19935&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference leads to an application crash and a
denial of service via an empty string in the message argument to the
imap_mail function of ext/imap/php_imap.c.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-66-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-66-1-samba/</link>
      <pubDate>Sat, 15 Dec 2018 10:54:09 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-66-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-66-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:3.6.6-6&amp;#43;deb7u18&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16851&#34;&gt;CVE-2018-16851&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Garming Sam of the Samba Team and Catalyst discovered a NULL pointer
dereference vulnerability in the Samba AD DC LDAP server allowing a
user able to read more than 256MB of LDAP entries to crash the Samba
AD DC&amp;rsquo;s LDAP server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-65-1 jasper security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-65-1-jasper/</link>
      <pubDate>Thu, 06 Dec 2018 17:11:39 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-65-1-jasper/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-65-1-jasper/">
      
&lt;p&gt;Package : jasper&lt;/p&gt;


&lt;p&gt;Version : 1.900.1-13&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-5203&#34;&gt;CVE-2015-5203&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-5221&#34;&gt;CVE-2015-5221&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-1867&#34;&gt;CVE-2016-1867&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-8690&#34;&gt;CVE-2016-8690&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13748&#34;&gt;CVE-2017-13748&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14132&#34;&gt;CVE-2017-14132&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18873&#34;&gt;CVE-2018-18873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19539&#34;&gt;CVE-2018-19539&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-19542&#34;&gt;CVE-2018-19542&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple issues were found in the JasPer JPEG-2000 library.&lt;/p&gt;
&lt;p&gt;CVE-2015-5203&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gustavo Grieco discovered an integer overflow vulnerability that allows
remote attackers to cause a denial of service or may have other unspecified
impact via a crafted JPEG 2000 image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2015-5221&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Josselin Feist found a double-free vulnerability that allows remote
attackers to cause a denial-of-service (application crash) by processing a
malformed image file.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-8690&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Gustavo Grieco discovered a NULL pointer dereference vulnerability that can
cause a denial-of-service via a crafted BMP image file. The update also
includes the fixes for the related issues CVE-2016-8884 and CVE-2016-8885
which complete the patch for CVE-2016-8690.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-13748&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that jasper does not properly release memory used to
store image tile data when image decoding fails which may lead to a
denial-of-service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-14132&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A heap-based buffer over-read was found related to the jas_image_ishomosamp
function that could be triggered via a crafted image file and may cause a
denial-of-service (application crash) or have other unspecified impact.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-18873&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-19539 and CVE-2018-19542&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Several NULL pointer dereferences were discovered that may lead to a
denial-of-service (application crash).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-64-1 suricata security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-64-1-suricata/</link>
      <pubDate>Mon, 03 Dec 2018 15:19:31 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-64-1-suricata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-64-1-suricata/">
      
&lt;p&gt;Package : suricata&lt;/p&gt;


&lt;p&gt;Version : 1.2.1-2&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-0928&#34;&gt;CVE-2015-0928&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-8954&#34;&gt;CVE-2015-8954&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6794&#34;&gt;CVE-2018-6794&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/TEMP-0000000-C04FE8&#34;&gt;TEMP-0000000-C04FE8&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2015-0928&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A NULL pointer dereference allows remote attackers to cause a
denial-of-service by specially crafted network traffic.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2015-8954&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The MemcmpLowercase function in Suricata improperly excludes the first
byte from comparisons, which might allow remote attackers to bypass
intrusion-prevention functionality via a crafted HTTP request.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6794&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Suricata is prone to an HTTP detection bypass vulnerability
in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP
flow and sends data before the 3-way handshake is complete, then the data
sent by the malicious server will be accepted by web clients such as a
web browser or Linux CLI utilities, but ignored by Suricata IDS
signatures. This mostly affects IDS signatures for the HTTP protocol and
TCP stream content; signatures for TCP packets will inspect such network
traffic as usual.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;TEMP-0000000-C04FE8 (no CVE assigned yet)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;If memory allocation fails and Suricata runs out of memory, a flaw in the
DCERP parser may lead to a denial-of-service (application crash).
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-63-1 perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-63-1-perl/</link>
      <pubDate>Mon, 03 Dec 2018 13:33:51 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-63-1-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-63-1-perl/">
      
&lt;p&gt;Package : perl&lt;/p&gt;


&lt;p&gt;Version : 5.14.2-21&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18311&#34;&gt;CVE-2018-18311&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jayakrishna Menon and Christophe Hauser discovered an integer
overflow vulnerability in Perl_my_setenv leading to a heap-based
buffer overflow with attacker-controlled input.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-62-1 libarchive security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-62-1-libarchive/</link>
      <pubDate>Fri, 30 Nov 2018 21:01:41 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-62-1-libarchive/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-62-1-libarchive/">
      
&lt;p&gt;Package : libarchive&lt;/p&gt;


&lt;p&gt;Version : 3.0.4-3&amp;#43;wheezy6&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14501&#34;&gt;CVE-2017-14501&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14502&#34;&gt;CVE-2017-14502&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-14503&#34;&gt;CVE-2017-14503&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were found in libarchive, a multi-format
archive and compression library. Heap-based buffer over-reads, NULL pointer
dereferences and out-of-bounds reads allow remote attackers to cause a
denial-of-service (application crash) via specially crafted archive files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-61-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-61-1-openjdk-7/</link>
      <pubDate>Thu, 22 Nov 2018 23:17:42 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-61-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-61-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u181-2.6.14-2~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-2952&#34;&gt;CVE-2018-2952&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3136&#34;&gt;CVE-2018-3136&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3139&#34;&gt;CVE-2018-3139&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3149&#34;&gt;CVE-2018-3149&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3169&#34;&gt;CVE-2018-3169&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3180&#34;&gt;CVE-2018-3180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3214&#34;&gt;CVE-2018-3214&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, incomplete TLS identity verification,
information disclosure or the execution of arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-60-1 pixman security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-60-1-pixman/</link>
      <pubDate>Thu, 22 Nov 2018 19:51:25 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-60-1-pixman/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-60-1-pixman/">
      
&lt;p&gt;Package : pixman&lt;/p&gt;


&lt;p&gt;Version : 0.26.0-4&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5297&#34;&gt;CVE-2018-5297&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An integer overflow issue has been reported in pixman prior to version 0.32.8. An attacker could cause an application using pixman to crash or, potentially, execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-59-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-59-1-openssl/</link>
      <pubDate>Wed, 21 Nov 2018 19:46:50 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-59-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-59-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-0735&#34;&gt;CVE-2018-0735&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5407&#34;&gt;CVE-2018-5407&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-0735
Samuel Weiser reported a timing vulnerability in the OpenSSL ECDSA signature generation, which might leak information to recover the private key.&lt;/p&gt;
&lt;p&gt;CVE-2018-5407
Alejandro Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and Nicola Tuveri reported a vulnerability to a timing side channel attack, which might be used to recover the private key.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-58-1 tiff3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-58-1-tiff3/</link>
      <pubDate>Sat, 17 Nov 2018 19:33:15 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-58-1-tiff3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-58-1-tiff3/">
      
&lt;p&gt;Package : tiff3&lt;/p&gt;


&lt;p&gt;Version : 3.9.6-11&amp;#43;deb7u13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18557&#34;&gt;CVE-2018-18557&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Out-of-bounds write due to ignoring buffer size can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-57-1 libdatetime-timezone-perl new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-57-1-libdatetime-timezone-perl/</link>
      <pubDate>Sun, 11 Nov 2018 22:51:14 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-57-1-libdatetime-timezone-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-57-1-libdatetime-timezone-perl/">
      
&lt;p&gt;Package : libdatetime-timezone-perl&lt;/p&gt;


&lt;p&gt;Version : 1:1.58-1&amp;#43;2018g&lt;/p&gt;


      &lt;p&gt;This update brings the Olson database changes from the 2018g version to
the Perl bindings.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-56-1 tzdata new upstream version</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-56-1-tzdata/</link>
      <pubDate>Sun, 11 Nov 2018 22:43:13 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-56-1-tzdata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-56-1-tzdata/">
      
&lt;p&gt;Package : tzdata&lt;/p&gt;


&lt;p&gt;Version : 2018g-0&amp;#43;deb7u1&lt;/p&gt;


      &lt;p&gt;This update brings the timezone changes from the upstream 2018g release.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-55-1 firmware-nonfree security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-55-1-firmware-nonfree/</link>
      <pubDate>Wed, 07 Nov 2018 23:11:22 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-55-1-firmware-nonfree/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-55-1-firmware-nonfree/">
      
&lt;p&gt;Package : firmware-nonfree&lt;/p&gt;


&lt;p&gt;Version : 20161130-4~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9417&#34;&gt;CVE-2017-9417&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13081&#34;&gt;CVE-2017-13081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13080&#34;&gt;CVE-2017-13080&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13079&#34;&gt;CVE-2017-13079&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13078&#34;&gt;CVE-2017-13078&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-13077&#34;&gt;CVE-2017-13077&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-0561&#34;&gt;CVE-2017-0561&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-0801&#34;&gt;CVE-2016-0801&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several security vulnerabilities were discovered in WiFi Firmware that could
allow remote attackers within radio range to spoof frames from access points to
clients or execute arbitrary code.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-54-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-54-1-curl/</link>
      <pubDate>Tue, 06 Nov 2018 22:33:05 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-54-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-54-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.26.0-1&amp;#43;wheezy25&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16842&#34;&gt;CVE-2018-16842&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Brian Carpenter discovered that the logic in the curl tool to wrap error
messages at 80 columns is flawed, leading to a read buffer overflow if a single
word in the message is itself longer than 80 bytes.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-53-1 mysql-5.5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-53-1-mysql-5.5/</link>
      <pubDate>Mon, 05 Nov 2018 14:38:41 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-53-1-mysql-5.5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-53-1-mysql-5.5/">
      
&lt;p&gt;Package : mysql-5.5&lt;/p&gt;


&lt;p&gt;Version : 5.5.62-0&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-2767&#34;&gt;CVE-2018-2767&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3058&#34;&gt;CVE-2018-3058&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3063&#34;&gt;CVE-2018-3063&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3066&#34;&gt;CVE-2018-3066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3070&#34;&gt;CVE-2018-3070&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3081&#34;&gt;CVE-2018-3081&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3133&#34;&gt;CVE-2018-3133&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3174&#34;&gt;CVE-2018-3174&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3282&#34;&gt;CVE-2018-3282&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.62, which includes additional changes. Please see the MySQL
5.5 Release Notes and Oracle&amp;rsquo;s Critical Patch Update advisory for
further details:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html&#34;&gt;https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-61.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html&#34;&gt;https://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html&#34;&gt;https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-62.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html&#34;&gt;https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-52-1 net-snmp security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-52-1-net-snmp/</link>
      <pubDate>Mon, 15 Oct 2018 19:56:03 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-52-1-net-snmp/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-52-1-net-snmp/">
      
&lt;p&gt;Package : net-snmp&lt;/p&gt;


&lt;p&gt;Version : 5.4.3~dfsg-2.8&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-18065&#34;&gt;CVE-2018-18065&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Magnus K. Stubman found that an authenticated remote attacker could crash an instance of Net-SNMP by sending a specially crafted UDP packet resulting in a denial-of-service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-51-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-51-1-tomcat7/</link>
      <pubDate>Sun, 14 Oct 2018 19:40:06 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-51-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-51-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u20&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11784&#34;&gt;CVE-2018-11784&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Sergey Bobrov discovered that when the default servlet returned a redirect to a
directory (e.g. redirecting to /foo/ when the user requested /foo) a specially
crafted URL could be used to cause the redirect to be generated to any URI of
the attackers choice.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-50-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-50-1-linux/</link>
      <pubDate>Sat, 13 Oct 2018 16:15:43 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-50-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-50-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.59-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3620&#34;&gt;CVE-2018-3620&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3639&#34;&gt;CVE-2018-3639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5391&#34;&gt;CVE-2018-5391&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6554&#34;&gt;CVE-2018-6554&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6555&#34;&gt;CVE-2018-6555&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-7755&#34;&gt;CVE-2018-7755&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9363&#34;&gt;CVE-2018-9363&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9516&#34;&gt;CVE-2018-9516&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10021&#34;&gt;CVE-2018-10021&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10323&#34;&gt;CVE-2018-10323&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10876&#34;&gt;CVE-2018-10876&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10877&#34;&gt;CVE-2018-10877&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10878&#34;&gt;CVE-2018-10878&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10879&#34;&gt;CVE-2018-10879&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10880&#34;&gt;CVE-2018-10880&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10881&#34;&gt;CVE-2018-10881&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10882&#34;&gt;CVE-2018-10882&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10883&#34;&gt;CVE-2018-10883&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10902&#34;&gt;CVE-2018-10902&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13093&#34;&gt;CVE-2018-13093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13094&#34;&gt;CVE-2018-13094&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13405&#34;&gt;CVE-2018-13405&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-13406&#34;&gt;CVE-2018-13406&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14609&#34;&gt;CVE-2018-14609&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14617&#34;&gt;CVE-2018-14617&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14633&#34;&gt;CVE-2018-14633&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14634&#34;&gt;CVE-2018-14634&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14678&#34;&gt;CVE-2018-14678&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14734&#34;&gt;CVE-2018-14734&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-15572&#34;&gt;CVE-2018-15572&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-15594&#34;&gt;CVE-2018-15594&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16276&#34;&gt;CVE-2018-16276&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16658&#34;&gt;CVE-2018-16658&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17182&#34;&gt;CVE-2018-17182&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2018-3620&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers have discovered a vulnerability in the way
the Intel processor designs have implemented speculative execution
of instructions in combination with handling of page-faults. This
flaw could allow an attacker controlling an unprivileged process
to read memory from arbitrary (non-user controlled) addresses,
including from the kernel and all other processes running on the
system or cross guest/host boundaries to read host memory.

This issue covers only attackers running normal processes. A
related issue (CVE-2018-3646) exists with KVM guests, and is not
yet fixed.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-3639&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers have discovered that Speculative Store Bypass
(SSB), a feature implemented in many processors, could be used to
read sensitive information from another context.  In particular,
code in a software sandbox may be able to read sensitive
information from outside the sandbox.  This issue is also known as
Spectre variant 4.

This update allows the issue to be mitigated on some x86
processors by disabling SSB.  This requires an update to the
processor&#39;s microcode, which is non-free.  DLA 1446-1 and DLA
1506-1 provided this for some Intel processors.  For other
processors, it may be included in an update to the system BIOS or
UEFI firmware, or in a future update to the intel-microcode or
amd64-microcode packages.

Disabling SSB can reduce performance significantly, so by default
it is only done in tasks that use the seccomp feature.
Applications that require this mitigation should request it
explicitly through the prctl() system call.  Users can control
where the mitigation is enabled with the spec_store_bypass_disable
kernel parameter.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5391 (FragmentSmack)&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Juha-Matti Tilli discovered a flaw in the way the Linux kernel
handled reassembly of fragmented IPv4 and IPv6 packets. A remote
attacker can take advantage of this flaw to trigger time and
calculation expensive fragment reassembly algorithms by sending
specially crafted packets, leading to remote denial of service.

This is mitigated by reducing the default limits on memory usage
for incomplete fragmented packets. The same mitigation can be
achieved without the need to reboot, by setting the sysctls:

net.ipv4.ipfrag_low_thresh = 196608
net.ipv6.ip6frag_low_thresh = 196608
net.ipv4.ipfrag_high_thresh = 262144
net.ipv6.ip6frag_high_thresh = 262144

The default values may still be increased by local configuration
if necessary.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6554&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A memory leak in the irda_bind function in the irda subsystem was
discovered. A local user can take advantage of this flaw to cause a
denial of service (memory consumption).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6555&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was discovered in the irda_setsockopt function in the irda
subsystem, allowing a local user to cause a denial of service
(use-after-free and system crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-7755&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Brian Belleville discovered a flaw in the fd_locked_ioctl function
in the floppy driver in the Linux kernel. The floppy driver copies a
kernel pointer to user memory in response to the FDGETPRM ioctl. A
local user with access to a floppy drive device can take advantage
of this flaw to discover the location kernel code and data.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-9363&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the Bluetooth HIDP implementation did not
correctly check the length of received report messages. A paired
HIDP device could use this to cause a buffer overflow, leading to
denial of service (memory corruption or crash) or potentially
remote code execution.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-9516&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the HID events interface in debugfs did not
correctly limit the length of copies to user buffers.  A local
user with access to these files could use this to cause a
denial of service (memory corruption or crash) or possibly for
privilege escalation.  However, by default debugfs is only
accessible by the root user.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10021&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A physically present attacker who unplugs a SAS cable can cause a
denial of service (memory leak and WARN).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10323, CVE-2018-13093, CVE-2018-13094&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wen Xu from SSLab at Gatech reported several NULL pointer
dereference flaws that may be triggered when mounting and
operating a crafted XFS volume.  An attacker able to mount
arbitrary XFS volumes could use this to cause a denial of service
(crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10876, CVE-2018-10877, CVE-2018-10878, CVE-2018-10879,
CVE-2018-10880, CVE-2018-10881, CVE-2018-10882, CVE-2018-10883&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wen Xu from SSLab at Gatech reported that crafted ext4 volumes
could trigger a crash or memory corruption.  An attacker able to
mount arbitrary ext4 volumes could use this for denial of service
or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10902&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the rawmidi kernel driver does not protect
against concurrent access which leads to a double-realloc (double
free) flaw. A local attacker can take advantage of this issue for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-13405&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered that the inode_init_owner function in
fs/inode.c in the Linux kernel allows local users to create files
with an unintended group ownership allowing attackers to escalate
privileges by making a plain file executable and SGID.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-13406&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dr Silvio Cesare of InfoSect reported a potential integer overflow
in the uvesafb driver.  A local user with permission to access
such a device might be able to use this for denial of service or
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14609&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wen Xu from SSLab at Gatech reported a potential null pointer
dereference in the F2FS implementation. An attacker able to mount
arbitrary F2FS volumes could use this to cause a denial of service
(crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14617&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wen Xu from SSLab at Gatech reported a potential null pointer
dereference in the HFS+ implementation. An attacker able to mount
arbitrary HFS+ volumes could use this to cause a denial of service
(crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14633&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Vincent Pelletier discovered a stack-based buffer overflow flaw in
the chap_server_compute_md5() function in the iSCSI target code. An
unauthenticated remote attacker can take advantage of this flaw to
cause a denial of service or possibly to get a non-authorized access
to data exported by an iSCSI target.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14634&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Qualys reported an integer overflow in the initialisation of the
stack for ELF executables, which can cause the stack to overlap
the argument or environment strings. A local user may use this to
defeat environment variable filtering in setuid programs, leading
to privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14678&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;M. Vefa Bicakci and Andy Lutomirski discovered a flaw in the
kernel exit code used on amd64 systems running as Xen PV guests.
A local user could use this to cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-14734&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A use-after-free bug was discovered in the InfiniBand
communication manager. A local user could use this to cause a
denial of service (crash or memory corruption) or possible for
privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-15572&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Esmaiel Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, and
Nael Abu-Ghazaleh, from University of California, Riverside,
reported a variant of Spectre variant 2, dubbed SpectreRSB. A
local user may be able to use this to read sensitive information
from processes owned by other users.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-15594&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Nadav Amit reported that some indirect function calls used in
paravirtualised guests were vulnerable to Spectre variant 2.  A
local user may be able to use this to read sensitive information
from the kernel.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-16276&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered that the yurex driver did not correctly limit
the length of copies to user buffers.  A local user with access to
a yurex device node could use this to cause a denial of service
(memory corruption or crash) or possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-16658&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was discovered that the cdrom driver does not correctly
validate the parameter to the CDROM_DRIVE_STATUS ioctl.  A user
with access to a cdrom device could use this to read sensitive
information from the kernel or to cause a denial of service
(crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-17182&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jann Horn discovered that the vmacache_flush_all function mishandles
sequence number overflows. A local user can take advantage of this
flaw to trigger a use-after-free, causing a denial of service
(crash or memory corruption) or privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Since the kernel ABI and binary package names have changed, you will need to use an
upgrade command that installs new dependencies, such as &amp;ldquo;apt-get dist-upgrade&amp;rdquo;.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-49-1 adplug security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-49-1-adplug/</link>
      <pubDate>Sun, 07 Oct 2018 18:41:16 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-49-1-adplug/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-49-1-adplug/">
      
&lt;p&gt;Package : adplug&lt;/p&gt;


&lt;p&gt;Version : 2.2.1&amp;#43;dfsg3-0.1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17825&#34;&gt;CVE-2018-17825&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a potential denial of service (DoS)
attack due to double-free vulnerability in the &amp;ldquo;adplug&amp;rdquo; sound library.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-48-1 python2.6 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-48-1-python2.6/</link>
      <pubDate>Sun, 30 Sep 2018 22:49:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-48-1-python2.6/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-48-1-python2.6/">
      
&lt;p&gt;Package : python2.6&lt;/p&gt;


&lt;p&gt;Version : 2.6.8-1.1&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000802&#34;&gt;CVE-2018-1000802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1060&#34;&gt;CVE-2018-1060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1061&#34;&gt;CVE-2018-1061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14647&#34;&gt;CVE-2018-14647&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-1000802
fix command injection in shutil module&lt;/p&gt;
&lt;p&gt;CVE-2018-1060 and CVE-2018-1061
fix REDOS vulnerabilities in poplib and difflib modules&lt;/p&gt;
&lt;p&gt;CVE-2018-14647
fix uninitialized Expat&amp;rsquo;s hash&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-47-1 python2.7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-47-1-python2.7/</link>
      <pubDate>Sun, 30 Sep 2018 11:26:46 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-47-1-python2.7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-47-1-python2.7/">
      
&lt;p&gt;Package : python2.7&lt;/p&gt;


&lt;p&gt;Version : 2.7.3-6&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000802&#34;&gt;CVE-2018-1000802&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1060&#34;&gt;CVE-2018-1060&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1061&#34;&gt;CVE-2018-1061&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14647&#34;&gt;CVE-2018-14647&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-1000802
fix command injection in shutil module&lt;/p&gt;
&lt;p&gt;CVE-2018-1060 and CVE-2018-1061
fix REDOS vulnerabilities in poplib and difflib modules&lt;/p&gt;
&lt;p&gt;CVE-2018-14647
fix uninitialized Expat&amp;rsquo;s hash&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-46-1 libxml2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-46-1-libxml2/</link>
      <pubDate>Tue, 25 Sep 2018 22:33:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-46-1-libxml2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-46-1-libxml2/">
      
&lt;p&gt;Package : libxml2&lt;/p&gt;


&lt;p&gt;Version : 2.8.0&amp;#43;dfsg1-7&amp;#43;wheezy13&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14404&#34;&gt;CVE-2018-14404&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14567&#34;&gt;CVE-2018-14567&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9251&#34;&gt;CVE-2018-9251&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-18258&#34;&gt;CVE-2017-18258&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2018-14404
Fix of a NULL pointer dereference which might result in a crash and
thus in a denial of service.&lt;/p&gt;
&lt;p&gt;CVE-2018-14567 and CVE-2018-9251
Approvement in LZMA error handling which prevents an infinite loop.&lt;/p&gt;
&lt;p&gt;CVE-2017-18258
Limit available memory to 100MB to avoid exhaustive memory
consumption by malicious files.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-45-1 dom4j security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-45-1-dom4j/</link>
      <pubDate>Mon, 24 Sep 2018 22:47:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-45-1-dom4j/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-45-1-dom4j/">
      
&lt;p&gt;Package : dom4j&lt;/p&gt;


&lt;p&gt;Version : 1.6.1&amp;#43;dfsg.3-2&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000632&#34;&gt;CVE-2018-1000632&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Mario Areias discovered that dom4j, a XML framework for Java, was vulnerable to
a XML injection attack. An attacker able to specify attributes or elements in
the XML document might be able to modify the whole XML document.&lt;/p&gt;
&lt;p&gt;This update also removes non-free files from the source package and the
dependency on backport-util-concurrent. It requires the new dependency
libmsv-java though.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-44-1 suricata security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-44-1-suricata/</link>
      <pubDate>Mon, 24 Sep 2018 20:10:18 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-44-1-suricata/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-44-1-suricata/">
      
&lt;p&gt;Package : suricata&lt;/p&gt;


&lt;p&gt;Version : 1.2.1-2&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-10728&#34;&gt;CVE-2016-10728&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it can lead to missed TCP/UDP detection in packets arriving afterwards.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-43-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-43-1-php5/</link>
      <pubDate>Thu, 20 Sep 2018 02:54:01 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-43-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-43-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u16&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-17082&#34;&gt;CVE-2018-17082&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability has been discovered in php5, a server-side,
HTML-embedded scripting language.  The Apache2 component allows XSS via
the body of a &amp;ldquo;Transfer-Encoding: chunked&amp;rdquo; request because of a defect
in request handling.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-42-1 libapache2-mod-perl2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-42-1-libapache2-mod-perl2/</link>
      <pubDate>Tue, 18 Sep 2018 19:49:54 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-42-1-libapache2-mod-perl2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-42-1-libapache2-mod-perl2/">
      
&lt;p&gt;Package : libapache2-mod-perl2&lt;/p&gt;


&lt;p&gt;Version : 2.0.7-3&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2011-2767&#34;&gt;CVE-2011-2767&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jan Ingvoldstad discovered that libapache2-mod-perl2 allows attackers to
execute arbitrary Perl code by placing it in a user-owned .htaccess file,
because (contrary to the documentation) there is no configuration option that
permits Perl code for the administrator&amp;rsquo;s control of HTTP request processing
without also permitting unprivileged users to run Perl code in the context of
the user account that runs Apache HTTP Server processes.&lt;/p&gt;
&lt;p&gt;This update requires a restart of the Apache 2 web server to take effect.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-41-1 lcms security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-41-1-lcms/</link>
      <pubDate>Tue, 18 Sep 2018 02:33:49 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-41-1-lcms/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-41-1-lcms/">
      
&lt;p&gt;Package : lcms&lt;/p&gt;


&lt;p&gt;Version : 1.19.dfsg2-1.2&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16435&#34;&gt;CVE-2018-16435&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Little CMS (aka Little Color Management System) has an integer overflow in the
AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow
in the SetData function via a crafted file in the second argument to
cmsIT8LoadFromFile.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-40-1 lcms2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-40-1-lcms2/</link>
      <pubDate>Tue, 18 Sep 2018 02:33:43 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-40-1-lcms2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-40-1-lcms2/">
      
&lt;p&gt;Package : lcms2&lt;/p&gt;


&lt;p&gt;Version : 2.2&amp;#43;git20110628-2.2&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-16435&#34;&gt;CVE-2018-16435&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Little CMS (aka Little Color Management System) has an integer overflow in the
AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow
in the SetData function via a crafted file in the second argument to
cmsIT8LoadFromFile.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-37-3 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-37-3-openssh/</link>
      <pubDate>Tue, 18 Sep 2018 00:41:01 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-37-3-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-37-3-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:6.0p1-4&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-15473&#34;&gt;CVE-2018-15473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update properly implements the fix for the issue first identified in
ELA-37-1.  The initial update package, version 1:6.0p1-4+deb7u8, is broken
and the subsequent package, version 1:6.0p1-4+deb7u9, reverts the incorrect
patch and so is vulnerable (as described in ELA-37-2).  The package version
referenced in this advisory contains the complete and correct fix for
CVE-2018-15473.&lt;/p&gt;
&lt;p&gt;The original advisory text follows:&lt;/p&gt;
&lt;p&gt;It was discovered that there was a user enumeration vulnerability in
OpenSSH. A remote attacker could test whether a certain user exists
on a target server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-39-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-39-1-intel-microcode/</link>
      <pubDate>Mon, 17 Sep 2018 14:54:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-39-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-39-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20180807a.1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3615&#34;&gt;CVE-2018-3615&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3620&#34;&gt;CVE-2018-3620&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3646&#34;&gt;CVE-2018-3646&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3639&#34;&gt;CVE-2018-3639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3640&#34;&gt;CVE-2018-3640&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5715&#34;&gt;CVE-2017-5715&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Security researchers identified speculative execution side-channel
methods which have the potential to improperly gather sensitive data
from multiple types of computing devices with different vendors’
processors and operating systems.&lt;/p&gt;
&lt;p&gt;In order to fix those issues an update to the intel-microcode package is
required, which is non-free. It is related to ELA-18-1 and adds more
mitigations for additional types of Intel processors.&lt;/p&gt;
&lt;p&gt;For more information please also read the official Intel security
advisories at:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00088.html&#34;&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00088.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html&#34;&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html&#34;&gt;https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-37-2 openssh regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-37-2-openssh/</link>
      <pubDate>Mon, 17 Sep 2018 13:26:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-37-2-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-37-2-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 1:6.0p1-4&amp;#43;deb7u9&lt;/p&gt;


      &lt;p&gt;It was discovered that the recent openssh update issued as ELA-37-1 caused a
regression. Authentication failed during public key exchange and a NULL pointer was
passed as argument instead. This could prevent a user from logging into a
system. This update reverts to the previous state until more information are
available.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-38-1 spice security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-38-1-spice/</link>
      <pubDate>Sun, 16 Sep 2018 21:10:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-38-1-spice/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-38-1-spice/">
      
&lt;p&gt;Package : spice&lt;/p&gt;


&lt;p&gt;Version : 0.11.0-1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10873&#34;&gt;CVE-2018-10873&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in SPICE before version 0.14.1 where the
generated code used for demarshalling messages lacked sufficient bounds
checks. A malicious client or server, after authentication, could send
specially crafted messages to its peer which would result in a crash or,
potentially, other impacts.&lt;/p&gt;
&lt;p&gt;The issue has been fixed by upstream by bailing out with an error if the
pointer to the start of some message data is strictly greater than the
pointer to the end of the  message data.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-37-1 openssh security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-37-1-openssh/</link>
      <pubDate>Sat, 15 Sep 2018 23:17:18 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-37-1-openssh/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-37-1-openssh/">
      
&lt;p&gt;Package : openssh&lt;/p&gt;


&lt;p&gt;Version : 6.0p1-4&amp;#43;deb7u8&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-15473&#34;&gt;CVE-2018-15473&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that there was a user enumeration vulnerability in
OpenSSH. A remote attacker could test whether a certain user exists
on a target server.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-36-1 curl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-36-1-curl/</link>
      <pubDate>Sat, 15 Sep 2018 17:41:41 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-36-1-curl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-36-1-curl/">
      
&lt;p&gt;Package : curl&lt;/p&gt;


&lt;p&gt;Version : 7.26.0-1&amp;#43;wheezy25&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14618&#34;&gt;CVE-2018-14618&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Zhaoyang Wu discovered that cURL, an URL transfer library, contains a buffer
overflow in the NTLM authentication code triggered by passwords that exceed 2GB
in length on 32bit systems.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-35-1 samba security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-35-1-samba/</link>
      <pubDate>Fri, 14 Sep 2018 19:18:55 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-35-1-samba/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-35-1-samba/">
      
&lt;p&gt;Package : samba&lt;/p&gt;


&lt;p&gt;Version : 2:3.6.6-6&amp;#43;deb7u17&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10858&#34;&gt;CVE-2018-10858&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Svyatoslav Phirsov discovered that the libsmbclient contains an error that
could allow a malicious server to overwrite client heap memory by returning an
extra long filename in a directory listing.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-34-1 redis security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-34-1-redis/</link>
      <pubDate>Wed, 05 Sep 2018 11:12:04 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-34-1-redis/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-34-1-redis/">
      
&lt;p&gt;Package : redis&lt;/p&gt;


&lt;p&gt;Version : 2:2.4.14-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12326&#34;&gt;CVE-2018-12326&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A buffer overflow vulnerability was discovered in the the redis key-value
database. The &amp;ldquo;redis-cli&amp;rdquo; tool could have allowed an attacker to achieve code
execution and/or escalate to higher privileges via a specially-crafted command
line.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-33-1 libtirpc security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-33-1-libtirpc/</link>
      <pubDate>Fri, 31 Aug 2018 19:55:24 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-33-1-libtirpc/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-33-1-libtirpc/">
      
&lt;p&gt;Package : libtirpc&lt;/p&gt;


&lt;p&gt;Version : 0.2.2-5&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14622&#34;&gt;CVE-2018-14622&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This version fixes a segmentation fault due to pointer becoming NULL.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-32-1 php5 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-32-1-php5/</link>
      <pubDate>Fri, 31 Aug 2018 12:45:14 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-32-1-php5/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-32-1-php5/">
      
&lt;p&gt;Package : php5&lt;/p&gt;


&lt;p&gt;Version : 5.4.45-0&amp;#43;deb7u15&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14851&#34;&gt;CVE-2018-14851&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14883&#34;&gt;CVE-2018-14883&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two vulnerabilities have been discovered in php5, a server-side,
HTML-embedded scripting language.  One (CVE-2018-14851) results in a
potential denial of service (out-of-bounds read and application crash)
via a crafted JPEG file.  The other (CVE-2018-14883) is an Integer
Overflow that leads to a heap-based buffer over-read.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-31-1 bind9 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-31-1-bind9/</link>
      <pubDate>Thu, 30 Aug 2018 22:15:48 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-31-1-bind9/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-31-1-bind9/">
      
&lt;p&gt;Package : bind9&lt;/p&gt;


&lt;p&gt;Version : 1:9.8.4.dfsg.P1-6&amp;#43;nmu2&amp;#43;deb7u21&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5740&#34;&gt;CVE-2018-5740&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The &amp;ldquo;deny-answer-aliases&amp;rdquo; feature in BIND has a flaw which can cause named to exit with an assertion failure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-30-1 libx11 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-30-1-libx11/</link>
      <pubDate>Wed, 29 Aug 2018 22:35:09 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-30-1-libx11/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-30-1-libx11/">
      
&lt;p&gt;Package : libx11&lt;/p&gt;


&lt;p&gt;Version : 2:1.5.0-1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14598&#34;&gt;CVE-2018-14598&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14599&#34;&gt;CVE-2018-14599&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14600&#34;&gt;CVE-2018-14600&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several issues were discovered in libx11, the client interface to the X
Windows System. The functions XGetFontPath, XListExtensions, and XListFonts are
vulnerable to an off-by-one override on malicious server responses. A malicious
server could also send a reply in which the first string overflows, causing a
variable set to NULL that will be freed later on, leading to a segmentation
fault and Denial of Service. The function XListExtensions in ListExt.c
interprets a variable as signed instead of unsigned, resulting in an
out-of-bounds write (of up to 128 bytes), leading to a Denial of Service or
possibly remote code execution.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-29-1 postgresql-9.1 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-29-1-postgresql-9.1/</link>
      <pubDate>Sun, 26 Aug 2018 23:28:28 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-29-1-postgresql-9.1/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-29-1-postgresql-9.1/">
      
&lt;p&gt;Package : postgresql-9.1&lt;/p&gt;


&lt;p&gt;Version : 9.1.24lts2-0&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10915&#34;&gt;CVE-2018-10915&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Andrew Krasichkov discovered that an unprivileged user of dblink or
postgres_fdw could bypass the checks intended to prevent use of server-side
credentials, such as a ~/.pgpass file owned by the operating-system user
running the server. Servers allowing peer authentication on local connections
are particularly vulnerable. Other attacks such as SQL injection into a
postgres_fdw session are also possible. Attacking postgres_fdw in this way
requires the ability to create a foreign server object with selected connection
parameters, but any user with access to dblink could exploit the problem. In
general, an attacker with the ability to select the connection parameters for a
libpq-using application could cause mischief, though other plausible attack
scenarios are harder to think of.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-28-1 tomcat-native security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-28-1-tomcat-native/</link>
      <pubDate>Sun, 19 Aug 2018 20:11:38 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-28-1-tomcat-native/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-28-1-tomcat-native/">
      
&lt;p&gt;Package : tomcat-native&lt;/p&gt;


&lt;p&gt;Version : 1.1.24-1&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8019&#34;&gt;CVE-2018-8019&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-8020&#34;&gt;CVE-2018-8020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;When using an OCSP responder Tomcat Native did not correctly handle invalid
responses. This allowed for revoked client certificates to be incorrectly
identified. It was therefore possible for users to authenticate with revoked
certificates when using mutual TLS. Users not using OCSP checks are not
affected by this vulnerability.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-27-1 tomcat7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-27-1-tomcat7/</link>
      <pubDate>Sun, 19 Aug 2018 18:35:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-27-1-tomcat7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-27-1-tomcat7/">
      
&lt;p&gt;Package : tomcat7&lt;/p&gt;


&lt;p&gt;Version : 7.0.28-4&amp;#43;deb7u19&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1336&#34;&gt;CVE-2018-1336&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;It was discovered that Tomcat incorrectly handled decoding certain UTF-8
strings which can lead to an infinite loop in the decoder causing a Denial of
Service.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-20-2 busybox regression update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-20-2-busybox/</link>
      <pubDate>Wed, 08 Aug 2018 11:14:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-20-2-busybox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-20-2-busybox/">
      
&lt;p&gt;Package : busybox&lt;/p&gt;


&lt;p&gt;Version : 1:1.20.0-7&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2011-5325&#34;&gt;CVE-2011-5325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9261&#34;&gt;CVE-2015-9261&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The security update of busybox announced as ELA-20-1 introduced a regression
due to an incomplete fix for CVE-2015-9261. It was no longer possible to
decompress gzip archives which exceeded a certain file size.&lt;/p&gt;
&lt;p&gt;It was also found that the patch to fix CVE-2011-5325, a symlinking attack, was
too strict in case of cpio archives. This update restores the old behavior.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-26 libxcursor security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-26-1-libxcursor/</link>
      <pubDate>Sun, 05 Aug 2018 17:02:58 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-26-1-libxcursor/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-26-1-libxcursor/">
      
&lt;p&gt;Package : libxcursor&lt;/p&gt;


&lt;p&gt;Version : 1:1.1.13-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9262&#34;&gt;CVE-2015-9262&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Insufficient memory allocation for terminating null character in string.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-25 libcgroup security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-25-1-libcgroup/</link>
      <pubDate>Sun, 05 Aug 2018 16:56:26 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-25-1-libcgroup/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-25-1-libcgroup/">
      
&lt;p&gt;Package : libcgroup&lt;/p&gt;


&lt;p&gt;Version : 0.38-1&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14348&#34;&gt;CVE-2018-14348&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Due to a wrong umask, access permissions of log files could have been insecure.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-24 fuse security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-24-1-fuse/</link>
      <pubDate>Tue, 31 Jul 2018 16:50:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-24-1-fuse/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-24-1-fuse/">
      
&lt;p&gt;Package : fuse&lt;/p&gt;


&lt;p&gt;Version : 2.9.0-2&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10906&#34;&gt;CVE-2018-10906&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This upload fixes a restriction bypass of the &amp;ldquo;allow_other&amp;rdquo; option when SELinux is active.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-23 wireshark security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-23-1-wireshark/</link>
      <pubDate>Sun, 29 Jul 2018 16:17:15 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-23-1-wireshark/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-23-1-wireshark/">
      
&lt;p&gt;Package : wireshark&lt;/p&gt;


&lt;p&gt;Version : 1.12.1&amp;#43;g01b65bf-4&amp;#43;deb8u6~deb7u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14339&#34;&gt;CVE-2018-14339&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14340&#34;&gt;CVE-2018-14340&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14341&#34;&gt;CVE-2018-14341&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14342&#34;&gt;CVE-2018-14342&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14343&#34;&gt;CVE-2018-14343&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14368&#34;&gt;CVE-2018-14368&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14369&#34;&gt;CVE-2018-14369&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Due to several flaws different dissectors could go in infinite loop or could be crashed by malicious packets.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-22-1 mutt security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-22-1-mutt/</link>
      <pubDate>Sat, 28 Jul 2018 05:00:58 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-22-1-mutt/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-22-1-mutt/">
      
&lt;p&gt;Package : mutt&lt;/p&gt;


&lt;p&gt;Version : 1.5.21-6.2&amp;#43;deb7u4&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14349&#34;&gt;CVE-2018-14349&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14350&#34;&gt;CVE-2018-14350&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14351&#34;&gt;CVE-2018-14351&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14352&#34;&gt;CVE-2018-14352&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14353&#34;&gt;CVE-2018-14353&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14354&#34;&gt;CVE-2018-14354&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14355&#34;&gt;CVE-2018-14355&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14356&#34;&gt;CVE-2018-14356&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14357&#34;&gt;CVE-2018-14357&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14358&#34;&gt;CVE-2018-14358&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14359&#34;&gt;CVE-2018-14359&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-14362&#34;&gt;CVE-2018-14362&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in mutt, a sophisticated
text-based Mail User Agent, resulting in denial of service, stack-based
buffer overflow, arbitrary command execution, and directory traversal
flaws.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-21-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-21-1-openssl/</link>
      <pubDate>Sun, 22 Jul 2018 21:31:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-21-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-21-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb7u6&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-0737&#34;&gt;CVE-2018-0737&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel
Alvarez Tapia discovered that the OpenSSL RSA Key generation algorithm has been
shown to be vulnerable to a cache timing side channel attack. An attacker with
sufficient access to mount cache timing attacks during the RSA key generation
process could recover the private key.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-20-1 busybox security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-20-1-busybox/</link>
      <pubDate>Sun, 22 Jul 2018 17:06:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-20-1-busybox/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-20-1-busybox/">
      
&lt;p&gt;Package : busybox&lt;/p&gt;


&lt;p&gt;Version : 1:1.20.0-7&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2011-5325&#34;&gt;CVE-2011-5325&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2013-1813&#34;&gt;CVE-2013-1813&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-4607&#34;&gt;CVE-2014-4607&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2014-9645&#34;&gt;CVE-2014-9645&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2015-9261&#34;&gt;CVE-2015-9261&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2147&#34;&gt;CVE-2016-2147&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2016-2148&#34;&gt;CVE-2016-2148&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15873&#34;&gt;CVE-2017-15873&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-16544&#34;&gt;CVE-2017-16544&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000517&#34;&gt;CVE-2018-1000517&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;CVE-2011-5325&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A path traversal vulnerability was found in Busybox implementation of tar.
tar will extract a symlink that points outside of the current working
directory and then follow that symlink when extracting other files. This
allows for a directory traversal attack when extracting untrusted tarballs.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2013-1813&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;When device node or symlink in /dev should be created inside 2-or-deeper
subdirectory (/dev/dir1/dir2.../node), the intermediate directories are
created with incorrect permissions.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-4607&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;An integer overflow may occur when processing any variant of a &amp;quot;literal
run&amp;quot; in the lzo1x_decompress_safe function. Each of these three locations
is subject to an integer overflow when processing zero bytes. This exposes
the code that copies literals to memory corruption.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2014-9645&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The add_probe function in modutils/modprobe.c in BusyBox allows local users
to bypass intended restrictions on loading kernel modules via a / (slash)
character in a module name, as demonstrated by an &amp;quot;ifconfig /usbserial up&amp;quot;
command or a &amp;quot;mount -t /snd_pcm none /&amp;quot; command.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2015-9261&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Unziping a specially crafted zip file results in a computation of an
invalid pointer and a crash reading an invalid address.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-2147&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Integer overflow in the DHCP client (udhcpc) in BusyBox allows remote
attackers to cause a denial of service (crash) via a malformed
RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2016-2148&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox allows
remote attackers to have unspecified impact via vectors involving
OPTION_6RD parsing.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-15873&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The get_next_block function in archival/libarchive/decompress_bunzip2.c in
BusyBox has an Integer Overflow that may lead to a write access violation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-16544&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In the add_match function in libbb/lineedit.c in BusyBox, the tab
autocomplete feature of the shell, used to get a list of filenames in a
directory, does not sanitize filenames and results in executing any escape
sequence in the terminal. This could potentially result in code execution,
arbitrary file writes, or other attacks.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1000517&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;BusyBox project BusyBox wget contains a Buffer Overflow vulnerability in
Busybox wget that can result in heap buffer overflow. This attack appear to
be exploitable via network connectivity.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-19-1 tiff3 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-19-1-tiff3/</link>
      <pubDate>Sat, 21 Jul 2018 14:11:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-19-1-tiff3/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-19-1-tiff3/">
      
&lt;p&gt;Package : tiff3&lt;/p&gt;


&lt;p&gt;Version : 3.9.6-11&amp;#43;deb7u12&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-11613&#34;&gt;CVE-2017-11613&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5784&#34;&gt;CVE-2018-5784&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Two flaws were found in the tiff3 image library that may allow remote attackers
to cause a denial of service (memory exhaustion or application crash) or
possibly have unspecified other impact via a crafted image file.&lt;/p&gt;
&lt;p&gt;CVE-2017-11613&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In tiff3 there is a denial of service vulnerability in the TIFFOpen
function. A crafted input will lead to a denial of service attack. During
the TIFFOpen process, td_imagelength is not checked. The value of
td_imagelength can be directly controlled by an input file. In the
ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is
called based on td_imagelength.  If we set the value of td_imagelength
close to the amount of system memory, it will hang the system or trigger
the OOM killer.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5784&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;A flaw was found in tiff3, there is an uncontrolled resource consumption in
the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage
this vulnerability to cause a denial of service via a crafted tif file.
This is possible because the declared number of directory entries is not
validated against the actual number of directory entries.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-18-1 intel-microcode security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-18-1-intel-microcode/</link>
      <pubDate>Thu, 19 Jul 2018 22:30:53 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-18-1-intel-microcode/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-18-1-intel-microcode/">
      
&lt;p&gt;Package : intel-microcode&lt;/p&gt;


&lt;p&gt;Version : 3.20180703.2~bpo8&amp;#43;1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5715&#34;&gt;CVE-2017-5715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3639&#34;&gt;CVE-2018-3639&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3640&#34;&gt;CVE-2018-3640&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;This update is required to mitigate against the so called Spectre variant 2 (branch
target injection) vulnerability which requires an update to the processors
microcode, which is non-free.&lt;/p&gt;
&lt;p&gt;For instance you can find more information about this topic at&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://meltdownattack.com/&#34;&gt;https://meltdownattack.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For recent Intel processors, the update is included in the intel-microcode
package from version 3.20180703.2&lt;del&gt;bpo8+1&lt;/del&gt;deb7u1. It is available via the
wheezy-lts-kernel repository. For other processors, it may be included in an
update to the system BIOS or UEFI firmware, or in a later update to the
amd64-microcode package.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-17-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-17-1-linux/</link>
      <pubDate>Thu, 19 Jul 2018 17:49:07 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-17-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-17-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.57-2~deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5715&#34;&gt;CVE-2017-5715&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-5753&#34;&gt;CVE-2017-5753&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1066&#34;&gt;CVE-2018-1066&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1093&#34;&gt;CVE-2018-1093&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1130&#34;&gt;CVE-2018-1130&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-3665&#34;&gt;CVE-2018-3665&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-5814&#34;&gt;CVE-2018-5814&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-9422&#34;&gt;CVE-2018-9422&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10853&#34;&gt;CVE-2018-10853&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10940&#34;&gt;CVE-2018-10940&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11506&#34;&gt;CVE-2018-11506&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12233&#34;&gt;CVE-2018-12233&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1000204&#34;&gt;CVE-2018-1000204&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
&lt;p&gt;CVE-2017-5715&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.

This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using new microcoded features.

This mitigation requires an update to the processor&#39;s microcode,
which is non-free. For recent Intel processors, this is included
in the intel-microcode package from version 3.20180703.2~bpo8+1~deb7u1.
For other processors, it may be included in an update to the
system BIOS or UEFI firmware, or in a later update to the
amd64-microcode package.

This vulnerability was already mitigated for the x86 architecture
by the &amp;quot;retpoline&amp;quot; feature.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2017-5753&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Further instances of code that was vulnerable to Spectre variant 1
(bounds-check bypass) have been mitigated.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1066&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used by a
malicious server for denial of service.

The previously applied mitigation for this issue was not
appropriate for Linux 3.16 and has been replaced by an alternate
fix.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1093&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Wen Xu reported that a crafted ext4 filesystem image could trigger
an out-of-bounds read in the ext4_valid_block_bitmap() function. A
local user able to mount arbitrary filesystems could use this for
denial of service.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1130&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot software found that the DCCP implementation of
sendmsg() does not check the socket state, potentially leading
to a null pointer dereference.  A local user could use this to
cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-3665&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Multiple researchers have discovered that some Intel x86
processors can speculatively read floating-point and vector
registers even when access to those registers is disabled.  The
Linux kernel&#39;s &amp;quot;lazy FPU&amp;quot; feature relies on that access control to
avoid saving and restoring those registers for tasks that do not
use them, and was enabled by default on x86 processors that do
not support the XSAVEOPT instruction.

If &amp;quot;lazy FPU&amp;quot; is enabled on one of the affected processors, an
attacker controlling an unprivileged process may be able to read
sensitive information from other users&#39; processes or the kernel.
This specifically affects processors based on the &amp;quot;Nehalem&amp;quot; and
&amp;quot;Westemere&amp;quot; core designs.

This issue has been mitigated by disabling &amp;quot;lazy FPU&amp;quot; by default
on all x86 processors that support the FXSAVE and FXRSTOR
instructions, which includes all processors known to be affected
and most processors that perform speculative execution.  It can
also be mitigated by adding the kernel parameter: eagerfpu=on
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-5814&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Jakub Jirasek reported race conditions in the USB/IP host driver.
A malicious client could use this to cause a denial of service
(crash or memory corruption), and possibly to execute code, on a
USB/IP server.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-9422&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;It was reported that the futex() system call could be used by an
unprivileged user for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10853&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Andy Lutomirski and Mika Penttilä reported that KVM for x86
processors did not perform a necessary privilege check when
emulating certain instructions.  This could be used by an
unprivileged user in a guest VM to escalate their privileges
within the guest.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-10940&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dan Carpenter reported that the optical disc driver (cdrom) does
not correctly validate the parameter to the CDROM_MEDIA_CHANGED
ioctl.  A user with access to a cdrom device could use this to
cause a denial of service (crash).
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-11506&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Piotr Gabriel Kosinski and Daniel Shapira reported that the
SCSI optical disc driver (sr) did not allocate a sufficiently
large buffer for sense data.  A user with access to a SCSI
optical disc device that can produce more than 64 bytes of
sense data could use this to cause a denial of service (crash
or memory corruption), and possibly for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-12233&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Shankara Pailoor reported that a crafted JFS filesystem image
could trigger a denial of service (memory corruption).  This
could possibly also be used for privilege escalation.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-1000204&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;The syzbot software found that the SCSI generic driver (sg) would
in some circumstances allow reading data from uninitialised
buffers, which could include sensitive information from the kernel
or other tasks.  However, only privileged users with the
CAP_SYS_ADMIN or CAP_SYS_RAWIO capability were allowed to do this,
so this has little or no security impact.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-16-1 tiff security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-16-1-tiff/</link>
      <pubDate>Wed, 18 Jul 2018 18:03:56 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-16-1-tiff/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-16-1-tiff/">
      
&lt;p&gt;Package : tiff&lt;/p&gt;


&lt;p&gt;Version : 4.0.2-6&amp;#43;deb7u22&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10963&#34;&gt;CVE-2018-10963&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF allows remote
attackers to cause a denial of service (assertion failure and application
crash) via a crafted file, a different vulnerability than CVE-2017-13726.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-15-1 cups security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-15-1-cups/</link>
      <pubDate>Sat, 14 Jul 2018 11:38:17 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-15-1-cups/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-15-1-cups/">
      
&lt;p&gt;Package : cups&lt;/p&gt;


&lt;p&gt;Version : 1.5.3-5&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-4180&#34;&gt;CVE-2018-4180&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-4181&#34;&gt;CVE-2018-4181&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-6553&#34;&gt;CVE-2018-6553&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities were discovered in CUPS, the Common UNIX Printing
System. These issues have been identified with the following CVE ids:&lt;/p&gt;
&lt;p&gt;CVE-2018-4180&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Dan Bastone of Gotham Digital Science discovered that a local
 attacker with access to cupsctl could escalate privileges by setting
 an environment variable.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-4181&lt;/p&gt;
&lt;pre&gt;&lt;code&gt; Eric Rafaloff and John Dunlap of Gotham Digital Science discovered
 that a local attacker can perform limited reads of arbitrary files
 as root by manipulating cupsd.conf.
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;CVE-2018-6553&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Dan Bastone of Gotham Digital Science discovered that an attacker
can bypass the AppArmor cupsd sandbox by invoking the dnssd backend
using an alternate name that has been hard linked to dnssd.
&lt;/code&gt;&lt;/pre&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-14-1 linux security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-14-1-linux/</link>
      <pubDate>Sun, 08 Jul 2018 18:28:19 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-14-1-linux/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-14-1-linux/">
      
&lt;p&gt;Package : linux&lt;/p&gt;


&lt;p&gt;Version : 3.16.56-1&amp;#43;deb8u1~deb7u1&lt;/p&gt;


      &lt;p&gt;The latest Linux Kernel 3.16 from Jessie was backported to Wheezy. It is now
available via the wheezy-lts-kernel repository. Please refer to the
[documentation] how to enable it. This update serves particularly as a means to
test the compatibility with your system environment. Please do not hesitate to
contact us if you discover any issues. Future updates will follow security
releases for Jessie closely.&lt;/p&gt;
&lt;p&gt;[documentation] &lt;a href=&#34;https://deb.freexian.com/extended-lts/docs/how-to-use-extended-lts/&#34;&gt;https://deb.freexian.com/extended-lts/docs/how-to-use-extended-lts/&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-13-1 ca-certificates security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-13-1-ca-certificates/</link>
      <pubDate>Sat, 07 Jul 2018 11:27:37 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-13-1-ca-certificates/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-13-1-ca-certificates/">
      
&lt;p&gt;Package : ca-certificates&lt;/p&gt;


&lt;p&gt;Version : 20130119&amp;#43;deb7u3&lt;/p&gt;


      &lt;p&gt;There have been a number of updates to the set of Certificate Authority
(CA) certificates that are considered &amp;ldquo;valid&amp;rdquo; or otherwise should be
trusted.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-12-1 ming security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-12-1-ming/</link>
      <pubDate>Sun, 01 Jul 2018 14:25:47 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-12-1-ming/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-12-1-ming/">
      
&lt;p&gt;Package : ming&lt;/p&gt;


&lt;p&gt;Version : 1:0.4.4-1.1&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11226&#34;&gt;CVE-2018-11226&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11225&#34;&gt;CVE-2018-11225&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11100&#34;&gt;CVE-2018-11100&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11095&#34;&gt;CVE-2018-11095&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in ming:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-11226&lt;/p&gt;
&lt;p&gt;The getString function in decompile.c in libming through 0.4.8 is vulnerable
to a heap buffer overflow. This vulnerability might be triggered by remote
attackers to cause a denial of service (buffer over-read and application
crash) via a crafted SWF file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-11225&lt;/p&gt;
&lt;p&gt;The dcputs function in decompile.c in libming through 0.4.8 is vulnerable
to a NULL pointer dereference. This vulnerability might be triggered by
remote attackers to cause a denial of service (NULL pointer dereference and
application crash) via a crafted SWF file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-11100&lt;/p&gt;
&lt;p&gt;The decompileSETTARGET function in decompile.c in libming through 0.4.8 is
vulnerable to a heap buffer overflow. This vulnerability might be triggered
by remote attackers to cause a denial of service (buffer over-read and
application crash) via a crafted SWF file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2018-11095&lt;/p&gt;
&lt;p&gt;The decompileJUMP function in decompile.c in libming through 0.4.8 is
vulnerable to a heap buffer overflow. This vulnerability might be triggered
by remote attackers to cause a denial of service (buffer over-read and
application crash) via a crafted SWF file.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-11-1 lame security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-11-1-lame/</link>
      <pubDate>Sun, 01 Jul 2018 10:38:36 -0400</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-11-1-lame/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-11-1-lame/">
      
&lt;p&gt;Package : lame&lt;/p&gt;


&lt;p&gt;Version : 3.99.5&amp;#43;repack1-3&amp;#43;deb7u2&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9870&#34;&gt;CVE-2017-9870&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9871&#34;&gt;CVE-2017-9871&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-9872&#34;&gt;CVE-2017-9872&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15018&#34;&gt;CVE-2017-15018&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15045&#34;&gt;CVE-2017-15045&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2017-15046&#34;&gt;CVE-2017-15046&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Multiple vulnerabilities have been discovered in lame:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-9870&lt;/p&gt;
&lt;p&gt;The III_i_stereo function in layer3.c in mpglib as used in LAME 3.99.5,
allows remote attackers to cause a denial of service (buffer over-read
and application crash) via a crafted audio file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-9871&lt;/p&gt;
&lt;p&gt;The III_i_stereo function in layer3.c in mpglib as used in LAME 3.99.5
allows remote attackers to cause a denial of service (stack-based buffer
overflow and application crash) or possibly have unspecified other impact
via a crafted audio file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-9872&lt;/p&gt;
&lt;p&gt;The III_dequantize_sample function in layer3.c in mpglib as used in LAME
3.99.5 allows remote attackers to cause a denial of service (stack-based
buffer overflow and application crash) or possibly have unspecified other
impact via a crafted audio file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-15018&lt;/p&gt;
&lt;p&gt;LAME 3.99.5 is vulnerable to a heap-based buffer over-read when handling a
malformed file in k_34_4 in vbrquantize.c. Remote attackers might leverage
this flaw to cause a denial of service or possibly have unspecified other
impact via a crafted audio file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-15045&lt;/p&gt;
&lt;p&gt;LAME 3.99.5 is vulnerable to a heap-based buffer over-read in fill_buffer
in libmp3lame/util.c, related to lame_encode_buffer_sample_t in
libmp3lame/lame.c. Remote attackers might leverage this flaw to cause a
denial of service or possibly have unspecified other impact via a crafted
audio file.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CVE-2017-15046&lt;/p&gt;
&lt;p&gt;LAME 3.99.5 is vulnerable to a stack-based buffer overflow in
unpack_read_samples in frontend/get_audio.c. Remote attackers might leverage
this flaw to cause a denial of service or possibly have unspecified other
impact via a crafted audio file.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-10-1 exiv2 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-10-1-exiv2/</link>
      <pubDate>Thu, 28 Jun 2018 04:47:48 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-10-1-exiv2/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-10-1-exiv2/">
      
&lt;p&gt;Package : exiv2&lt;/p&gt;


&lt;p&gt;Version : 0.23-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10958&#34;&gt;CVE-2018-10958&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10998&#34;&gt;CVE-2018-10998&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10999&#34;&gt;CVE-2018-10999&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11531&#34;&gt;CVE-2018-11531&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12264&#34;&gt;CVE-2018-12264&lt;/a&gt;
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12265&#34;&gt;CVE-2018-12265&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in exiv2, a C++ library and
a command line utility to manage image metadata, resulting in denial of
service, heap-based buffer over-read/overflow, memory exhaustion, and
application crash.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-9-1 plexus-archiver security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-9-1-plexus-archiver/</link>
      <pubDate>Tue, 26 Jun 2018 19:10:29 +0100</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-9-1-plexus-archiver/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-9-1-plexus-archiver/">
      
&lt;p&gt;Package : plexus-archiver&lt;/p&gt;


&lt;p&gt;Version : 1.0~alpha12-3&amp;#43;deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-1002200&#34;&gt;CVE-2018-1002200&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;An arbitrary file write vulnerability was discovered in plexus-archiver,
the archiver plugin for the Plexus modular compiler system.&lt;/p&gt;
&lt;p&gt;A specially-crafted &lt;code&gt;.zip&lt;/code&gt; file could overwrite any file on disk, leading
to a privilege esclation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-8-1 ruby-passenger security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-8-1-ruby-passenger/</link>
      <pubDate>Mon, 25 Jun 2018 18:53:40 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-8-1-ruby-passenger/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-8-1-ruby-passenger/">
      
&lt;p&gt;Package : ruby-passenger&lt;/p&gt;


&lt;p&gt;Version : 3.0.13debian-1&amp;#43;deb7u3&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12029&#34;&gt;CVE-2018-12029&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered by the Pulse Security team.
It was exploitable only when running a non-standard
passenger_instance_registry_dir, via a race condition where after a file
was created, there was a window in which it could be replaced with a
symlink before it was chowned via the path and not the file descriptor.
If the symlink target was to a file which would be executed by root such as
root&amp;rsquo;s crontab file, then privilege escalation was possible.
This is now mitigated by using fchown().&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-7-1 perl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-7-1-perl/</link>
      <pubDate>Sat, 23 Jun 2018 15:23:06 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-7-1-perl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-7-1-perl/">
      
&lt;p&gt;Package : perl&lt;/p&gt;


&lt;p&gt;Version : 5.14.2-21&amp;#43;deb7u7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12015&#34;&gt;CVE-2018-12015&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Jakub Wilk discovered a directory traversal flaw in the Archive::Tar
module, allowing an attacker to overwrite any file writable by the
extracting user via a specially crafted tar archive.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-6-1 ghostscript security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-6-1-ghostscript/</link>
      <pubDate>Sat, 23 Jun 2018 15:22:58 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-6-1-ghostscript/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-6-1-ghostscript/">
      
&lt;p&gt;Package : ghostscript&lt;/p&gt;


&lt;p&gt;Version : 9.05~dfsg-6.3&amp;#43;deb7u9&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11645&#34;&gt;CVE-2018-11645&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;A vulnerability was discovered in Ghostscript, the GPL PostScript/PDF
interpreter, which may lead to the potential information disclosure
about files for which read permissions are not available.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-5-1 gnupg security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-5-1-gnupg/</link>
      <pubDate>Sat, 23 Jun 2018 15:22:38 +0000</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-5-1-gnupg/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-5-1-gnupg/">
      
&lt;p&gt;Package : gnupg&lt;/p&gt;


&lt;p&gt;Version : 1.4.12-7&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-12020&#34;&gt;CVE-2018-12020&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Marcus Brinkmann discovered that GnuGPG performed insufficient
sanitisation of file names displayed in status messages, which could be
abused to fake the verification status of a signed email.&lt;/p&gt;
&lt;p&gt;Details can be found in the upstream advisory at
&lt;a href=&#34;https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html&#34;&gt;https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html&lt;/a&gt;&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-4-1 openssl security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-4-1-openssl/</link>
      <pubDate>Sat, 23 Jun 2018 15:47:39 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-4-1-openssl/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-4-1-openssl/">
      
&lt;p&gt;Package : openssl&lt;/p&gt;


&lt;p&gt;Version : 1.0.1t-1&amp;#43;deb7u5&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-0732&#34;&gt;CVE-2018-0732&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Possible DoS by a malicious server that sends a very large prime value to the client during TLS handshake.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-3-1 file security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-3-1-file/</link>
      <pubDate>Thu, 21 Jun 2018 08:23:59 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-3-1-file/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-3-1-file/">
      
&lt;p&gt;Package : file&lt;/p&gt;


&lt;p&gt;Version : 5.11-2&amp;#43;deb7u10&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-10360&#34;&gt;CVE-2018-10360&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;do_core_note() in readelf.c allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-2-1 openjdk-7 security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-2-1-openjdk-7/</link>
      <pubDate>Fri, 15 Jun 2018 08:54:30 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-2-1-openjdk-7/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-2-1-openjdk-7/">
      
&lt;p&gt;Package : openjdk-7&lt;/p&gt;


&lt;p&gt;Version : 7u181-2.6.14-1~deb7u1&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-2790%20CVE-2018-2794%20CVE-2018-2795%20CVE-2018-2796%20CVE-2018-2797%20CVE-2018-2798%20CVE-2018-2799%20CVE-2018-2800%20CVE-2018-2814%20CVE-2018-2815&#34;&gt;CVE-2018-2790 CVE-2018-2794 CVE-2018-2795 CVE-2018-2796 CVE-2018-2797 CVE-2018-2798 CVE-2018-2799 CVE-2018-2800 CVE-2018-2814 CVE-2018-2815&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, execution of arbitrary code or bypass of JAR
signature validation.&lt;/p&gt;

      </description>
    </item>
    
    
    
    <item>
      <title>ELA-1-1 git security update</title>
      
      <link>https://www.freexian.com/fr/lts/extended/updates/ela-1-1-git/</link>
      <pubDate>Thu, 07 Jun 2018 13:43:49 +0200</pubDate>
      
      <guid>https://www.freexian.com/fr/lts/extended/updates/ela-1-1-git/</guid>
      <description type="html" xml:base="https://www.freexian.com/fr/lts/extended/updates/ela-1-1-git/">
      
&lt;p&gt;Package : git&lt;/p&gt;


&lt;p&gt;Version : 1:1.7.10.4-1&amp;#43;wheezy7&lt;/p&gt;


&lt;p&gt;Related CVEs : 
        
        &lt;a href=&#34;https://deb.freexian.com/extended-lts/tracker/CVE-2018-11235&#34;&gt;CVE-2018-11235&lt;/a&gt;
        
        &lt;/p&gt;

      &lt;p&gt;Etienne Stalmans discovered that git, a fast, scalable, distributed revision
control system, is prone to an arbitrary code execution vulnerability
exploitable via specially crafted submodule names in a .gitmodules file.&lt;/p&gt;

      </description>
    </item>
    
    
  </channel>
</rss>
