aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorUtkarsh Gupta <utkarsh@debian.org>2023-03-13 02:16:48 +0530
committerUtkarsh Gupta <utkarsh@debian.org>2023-03-13 02:16:48 +0530
commit1852009a0a3739c2ddbb426f310ed347889e4d2e (patch)
tree9822a6ffbeac3cf0d1fc5afc072a627e575bd01a
parentc2d77a82befab4d03cc51d766bbd732e4399dde8 (diff)
DLA-3359-1 advisory
-rw-r--r--english/lts/security/2023/dla-3359.data10
-rw-r--r--english/lts/security/2023/dla-3359.wml38
2 files changed, 48 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3359.data b/english/lts/security/2023/dla-3359.data
new file mode 100644
index 00000000000..d97f3804d32
--- /dev/null
+++ b/english/lts/security/2023/dla-3359.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-3359-1 libapache2-mod-auth-mellon</define-tag>
+<define-tag report_date>2023-03-13</define-tag>
+<define-tag secrefs>CVE-2019-13038 CVE-2021-3639 Bug#931265 Bug#991730</define-tag>
+<define-tag packages>libapache2-mod-auth-mellon</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2023/dla-3359.wml b/english/lts/security/2023/dla-3359.wml
new file mode 100644
index 00000000000..c811a531dd2
--- /dev/null
+++ b/english/lts/security/2023/dla-3359.wml
@@ -0,0 +1,38 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+<p>libapache2-mod-auth-mellon, a SAML 2.0 authentication module for Apache,
+were reported to have the following vulnerabilities.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-13038">CVE-2019-13038</a>
+
+ <p>mod_auth_mellon had an Open Redirect via the login?ReturnTo= substring,
+ as demonstrated by omitting the // after http: in the target URL.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3639">CVE-2021-3639</a>
+
+ <p>mod_auth_mellon did not sanitize logout URLs properly. This issue could
+ be used by an attacker to facilitate phishing attacks by tricking users
+ into visiting a trusted web application URL that redirects to an external
+ and potentially malicious server.</p></li>
+
+</ul>
+
+<p>For Debian 10 buster, these problems have been fixed in version
+0.14.2-1+deb10u1.</p>
+
+<p>We recommend that you upgrade your libapache2-mod-auth-mellon packages.</p>
+
+<p>For the detailed security status of libapache2-mod-auth-mellon please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/libapache2-mod-auth-mellon">https://security-tracker.debian.org/tracker/libapache2-mod-auth-mellon</a></p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2023/dla-3359.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy