-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0370
                         uriparser security update
                              27 January 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           uriparser
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-46142 CVE-2021-46141 

Reference:         ESB-2022.0219

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2022/01/msg00029.html
   https://lists.debian.org/debian-security-announce/2022/msg00029.html

Comment: This bulletin contains two (2) Debian security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2883-2                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
January 26, 2022                              https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : uriparser
Version        : 0.8.4-1+deb9u4
CVE ID         : CVE-2021-46141

It was discovered that the fix for CVE-2021-46141 released in
uriparser version 0.8.4-1+deb9u3 was incomplete.

We therefore recommend that you upgrade your uriparser packages to
version 0.8.4-1+deb9u4.

For the detailed security status of uriparser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/uriparser

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=JajQ
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5063-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 26, 2022                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : uriparser
CVE ID         : CVE-2021-46141 CVE-2021-46142

Two vulnerabilities were discovered in uriparser, a library that parses
Uniform Resource Identifiers (URIs), which may result in denial of
service or potentially in the the execution of arbitrary code.

For the oldstable distribution (buster), these problems have been fixed
in version 0.9.1-1+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 0.9.4+dfsg-1+deb11u1.

We recommend that you upgrade your uriparser packages.

For the detailed security status of uriparser please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/uriparser

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=H/LD
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=BsoW
-----END PGP SIGNATURE-----