Debian 10483 Published by

Debian GNU/Linux 11 (Bullseye) LTS has received two security updates: [DLA 4180-1] pgbouncer and [DLA 4181-1] glibc.

[DLA 4180-1] pgbouncer security update
[DLA 4181-1] glibc security update




[SECURITY] [DLA 4180-1] pgbouncer security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4180-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Andreas Henriksson
May 27, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : pgbouncer
Version : 1.15.0-1+deb11u1
CVE ID : CVE-2021-3935 CVE-2025-2291
Debian Bug : 1103394

PgBouncer is a lightweight connection pooler for PostgreSQL.

CVE-2021-3539

When PgBouncer is configured to use "cert" authentication, a
man-in-the-middle attacker can inject arbitrary SQL queries when a
connection is first established, despite the use of TLS certificate
verification and encryption. This flaw affects PgBouncer versions prior to
1.16.1.

CVE-2025-2291

Password can be used past expiry in PgBouncer due to auth_query not taking
into account Postgres its VALID UNTIL value, which allows an attacker to
log in with an already expired password

For Debian 11 bullseye, these problems have been fixed in version
1.15.0-1+deb11u1.

We recommend that you upgrade your pgbouncer packages.

For the detailed security status of pgbouncer please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pgbouncer

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4181-1] glibc security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4181-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Sean Whitton
May 27, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : glibc
Version : 2.31-13+deb11u13
CVE ID : CVE-2025-4802

A flaw was discovered in the dynamic linking support in the GNU C
Library, the C standard library implementation used by Debian.

Privilege escalation may be possible in statically compiled setuid
binaries that call dlopen(), due to an untrusted LD_LIBRARY_PATH
environment variable vulnerability. This includes calls to dlopen()
internal to glibc itself, made after user calls to setlocale() or to NSS
functions such as getaddrinfo().

For Debian 11 bullseye, this problem has been fixed in version
2.31-13+deb11u13.

We recommend that you upgrade your glibc packages.

For the detailed security status of glibc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/glibc

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS