Debian GNU/Linux 10 (Buster) Extended LTS:
ELA-1418-1 request-tracker4 security update
Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4155-1] libapache2-mod-auth-openidc security update
[DLA 4156-1] openssh security update
[DLA 4157-1] request-tracker4 security update
Debian GNU/Linux 12 (Bookworm):
[DSA 5917-1] libapache2-mod-auth-openidc security update
[SECURITY] [DLA 4155-1] libapache2-mod-auth-openidc security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4155-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Moritz Schlarb
May 08, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : libapache2-mod-auth-openidc
Version : 2.4.9.4-0+deb11u6
CVE ID : CVE-2025-3891
Debian Bug : 1104484
A vulnerability has been fixed in mod_auth_openidc, an OpenID Certified
authentication and authorization module for the Apache 2.x HTTP server
that implements the OpenID Connect Relying Party functionality.
An unauthenticated attacker can crash the Apache httpd process by sending
a POST request without a Content-Type header when OIDCPreservePost is
enabled in mod_auth_openidc. This leads to denial of service.
A workaround is to disable the OIDCPreservePost directive.
For Debian 11 bullseye, this problem has been fixed in version
2.4.9.4-0+deb11u6.
We recommend that you upgrade your libapache2-mod-auth-openidc packages.
For the detailed security status of libapache2-mod-auth-openidc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DLA 4156-1] openssh security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-4156-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Colin Watson
May 08, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : openssh
Version : 1:8.4p1-5+deb11u5
CVE ID : CVE-2025-32728
Debian Bug : 1102603
Tim Rice discovered that the DisableForwarding directive was documented
as disabling X11 and agent forwarding but it failed to do so.
For Debian 11 bullseye, this problem has been fixed in version
1:8.4p1-5+deb11u5.
We recommend that you upgrade your openssh packages.
For the detailed security status of openssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssh
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DLA 4157-1] request-tracker4 security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-4157-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Santiago Ruano Rincón
May 08, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : request-tracker4
Version : 4.4.4+dfsg-2+deb11u4
CVE ID : CVE-2024-3262 CVE-2025-2545 CVE-2025-30087
Debian Bug : 1068452 1104424
Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system, which could result in
information disclosure, cross-site scripting and use of weak encryption
for S/MIME emails.
For Debian 11 bullseye, these problems have been fixed in version
4.4.4+dfsg-2+deb11u4.
We recommend that you upgrade your request-tracker4 packages.
For the detailed security status of request-tracker4 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/request-tracker4
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DSA 5917-1] libapache2-mod-auth-openidc security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5917-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 08, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libapache2-mod-auth-openidc
CVE ID : CVE-2025-3891
A vulnerability has been discovered in mod_auth_openidc, an OpenID
Certified authentication and authorization module for the Apache HTTP
server that implements the OpenID Connect Relying Party functionality:
An unauthenticated attacker could crash the Apache httpd process by
sending a POST request without a Content-Type header if the
'OIDCPreservePost' directive is enabled, resulting in denial of
service.
For the stable distribution (bookworm), this problem has been fixed in
version 2.4.12.3-2+deb12u4.
We recommend that you upgrade your libapache2-mod-auth-openidc packages.
For the detailed security status of libapache2-mod-auth-openidc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libapache2-mod-auth-openidc
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
ELA-1418-1 request-tracker4 security update
Package : request-tracker4
Version : 4.4.3-2+deb10u4 (buster)
Related CVEs :
CVE-2024-3262
CVE-2025-2545
CVE-2025-30087
Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system, which could result in
information disclosure, cross-site scripting and use of weak encryption
for S/MIME emails.ELA-1418-1 request-tracker4 security update