aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2023/dla-3514.wml
blob: ee5013484a41c359391905e9f2b8bb9701aca8e7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>

<p>It was discovered that there was a protential LDAP injection vulnerability
in Bouncy Castle, a cryptographic library for Java. During the certificate
validation process, bouncycastle used the certificate's "Subject Name" into an
LDAP search filter without any escaping.</p>

<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-33201">CVE-2023-33201</a>

    <p>Bouncy Castle For Java before 1.74 is affected by an LDAP injection
    vulnerability. The vulnerability only affects applications that use an LDAP
    CertStore from Bouncy Castle to validate X.509 certificates. During the
    certificate validation process, Bouncy Castle inserts the certificate's
    Subject Name into an LDAP search filter without any escaping, which leads
    to an LDAP injection vulnerability.</p></li>
</ul>

<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
1.60-1+deb10u1.</p>

<p>We recommend that you upgrade your bouncycastle packages.</p>

<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2023/dla-3514.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy