Debian 10250 Published by

Debian GNU/Linux has received a number of security upgrades, including DLA 3910-1 e2fsprogs, ELA-1196-1 e2fsprogs, DSA 5784-1 oath-toolkit, DSA 5783-1 firefox-esr, and ELA-1197-1 ntfs-3g:

Debian GNU/Linux 8 (Jessie), 9 (Stretch), and 10 (Buster) Extended LTS:
ELA-1196-1 e2fsprogs security update

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1197-1 ntfs-3g security update

Debian GNU/Linux 11 (Bullseye) LTS:
[SECURITY] [DLA 3910-1] e2fsprogs security update

Debian GNU/Linux 12 (Bookworm):
[SECURITY] [DSA 5784-1] oath-toolkit security update
[SECURITY] [DSA 5783-1] firefox-esr security update



[SECURITY] [DLA 3910-1] e2fsprogs security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3910-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
October 04, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : e2fsprogs
Version : 1.46.2-2+deb11u1
CVE ID : CVE-2022-1304
Debian Bug : 1010263

An out-of-bounds read/write vulnerability has been fixed in the e2fsck
tool of the ext2/ext3/ext4 file system utilities e2fsprogs.

For Debian 11 bullseye, this problem has been fixed in version
1.46.2-2+deb11u1.

We recommend that you upgrade your e2fsprogs packages.

For the detailed security status of e2fsprogs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/e2fsprogs

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1196-1 e2fsprogs security update

Package : e2fsprogs
Version : 1.42.12-2+deb8u3 (jessie), 1.43.4-2+deb9u3 (stretch), 1.44.5-1+deb10u4 (buster)

Related CVEs :
CVE-2022-1304

An out-of-bounds read/write vulnerability has been fixed in the e2fsck tool of the ext2/ext3/ext4 file system utilities e2fsprogs.

ELA-1196-1 e2fsprogs security update


[SECURITY] [DSA 5784-1] oath-toolkit security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5784-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 04, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : oath-toolkit
CVE ID : CVE-2024-47191

Fabian Vogt reported that the PAM module in oath-toolkit, a collection
of components to build one-time password authentication systems, does
not safely perform file operations in users's home directories when
using the usersfile feature (allowing to place the OTP state in the home
directory of the to-be-authenticated user). A local user can take
advantage of this flaw for root privilege escalation.

For the stable distribution (bookworm), this problem has been fixed in
version 2.6.7-3.1+deb12u1.

We recommend that you upgrade your oath-toolkit packages.

For the detailed security status of oath-toolkit please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/oath-toolkit

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


[SECURITY] [DSA 5783-1] firefox-esr security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5783-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 04, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2024-9392 CVE-2024-9393 CVE-2024-9394 CVE-2024-9401

Multiple security issues have been found in the Mozilla Firefox
web browser, which could potentially result in the execution
of arbitrary code.

Debian follows the extended support releases (ESR) of Firefox.
Starting with this update we're now following the 128.x releases.

Between 115.x and 128.x, Firefox has seen a number of feature
updates. For more information please refer to
https://www.mozilla.org/en-US/firefox/128.0esr/releasenotes/

For the stable distribution (bookworm), these problems have been fixed in
version 128.3.0esr-1~deb12u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/


ELA-1197-1 ntfs-3g security update

Package : ntfs-3g
Version : 1:2016.2.22AR.1+dfsg-1+deb9u5 (stretch), 1:2017.3.23AR.3-4+deb11u4~deb10u1 (buster)

Related CVEs :
CVE-2023-52890

Use-after-free in ntfs_uppercase_mbs() has been fixed in ntfs-3g, a read/write driver for the NTFS filesystem.

ELA-1197-1 ntfs-3g security update