The Shibboleth-SP update, identified as DSA 5994-1, addresses a severe SQL vulnerability in its ODBC plugin, which could lead to information leaks. This vulnerability was discovered by Florian Stuhlmann. Users are advised to update their Shibboleth-SP packages, with fixes provided in version 3.4.1+dfsg-2+deb12u1 for Bookworm and 3.5.0+dfsg-2+deb13u1 for Trixie.
Similarly, the modsecurity-apache update, labeled DLA 4294-1, resolves a cross-site scripting (XSS) vulnerability that arises from inadequate return value handling. This security flaw affects the Apache web server module designed to enhance web application security. The fix has been applied in version 2.9.3-3+deb11u5 for Bullseye users.
Debian encourages all users to upgrade their packages to ensure their systems remain secure. Additional resources, including security advisories and system update instructions, are available on the Debian security website.
Extending this information, users should regularly check for updates and stay informed about security advisories from Debian to protect their systems from emerging threats. Implementing best practices, such as routine backups and employing firewall measures, can further bolster system security. Furthermore, users may consider subscribing to Debian mailing lists or forums to receive timely updates and community support regarding security issues
Shibboleth-SP and Mod Security security updates for Debian
Debian has released security updates for two packages: Shibboleth-SP (DSA 5994-1) for both Debian GNU/Linux 12 (Bookworm) and 13 (Trixie) and modsecurity-apache (DLA 4294-1) for Debian GNU/Linux 11 (Bullseye) LTS. The Shibboleth-SP update fixes an SQL vulnerability in its ODBC plugin, which could result in an information leak. The modsecurity-apache update fixes a cross-site scripting issue caused by insufficient return value handling.
[DSA 5994-1] shibboleth-sp security update
[DLA 4294-1] modsecurity-apache security updateShibboleth-SP and Mod Security security updates for Debian @ Linux Compatible