Syslog-NG, PAM, Corosync, Kernel updates for Debian

Published by

In October 2023, security updates were released for various Debian packages, including syslog-ng, PAM (Pluggable Authentication Module), Corosync, and the Linux kernel. These updates address several critical security vulnerabilities that could potentially allow attackers to impersonate legitimate entities, compromise secure logging, or elevate their privileges to root.

Key Updates:
- Syslog-ng: A vulnerability was found related to the mishandling of wildcard certificates during TLS authentication, which could allow for man-in-the-middle attacks. Users are urged to upgrade to the latest versions (3.8.1-10+deb9u2 for Stretch and 3.19.1-5+deb10u2 for Buster) to mitigate these risks.
- PAM: Multiple vulnerabilities were identified in the PAM namespace module, including denial of service via `mkfifo` and privilege escalation through symlink attacks. Users should upgrade to versions 1.1.8-3.6+deb9u1 for Stretch and 1.3.1-5+deb10u1 for Buster.
- Corosync: A stack-based buffer overflow was discovered that could occur without encryption or if an attacker knows the encryption key. The updated version for Debian 11 (Bullseye) is 3.1.2-2+deb11u1.
- Linux Kernel: A multitude of vulnerabilities, including privilege escalation, denial of service, and information leaks, were addressed in the kernel updates. The fixed version for Debian 12 (Bookworm) is 6.1.153-1, while for Debian 13 (Trixie), it is 6.12.48-1.

Security Advisories:
- ELA-1523-1: Syslog-ng security update
- ELA-1522-1: PAM security update
- ELA-1524-1: Corosync security update
- DLA 4308-1: Corosync security update for LTS
- DSA 6009-1: Linux security update for LTS
- DSA 6008-1: Linux security update for stable distribution

Given the severity of these vulnerabilities and the potential impact on system integrity and security, it is highly recommended that users of affected Debian versions promptly update their packages to the latest versions. Regular updates and patching are crucial in maintaining system security and protecting against emerging threats. Users are also encouraged to consult the Debian security tracker for the most current information on vulnerabilities and their resolutions.

As the landscape of cybersecurity continues to evolve, staying informed about security updates and best practices is essential for all users and administrators

Syslog-NG, PAM, Corosync, Kernel updates for Debian

Multiple security updates have been issued for various Debian packages, including syslog-ng, pam, corosync, and linux. The updates fix security problems like mishandling of wildcard certificates during TLS authentication, denial-of-service attacks using mkfifo, buffer overflows in corosync, and different issues that could let attackers gain higher access or leak information in the Linux kernel. These vulnerabilities could allow attackers to impersonate legitimate endpoints, compromise secure logging, or elevate their privileges to root. It is recommended that users upgrade their packages to the latest versions to address these security concerns.

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1523-1 syslog-ng security update
ELA-1522-1 pam security update
ELA-1524-1 corosync security update

Debian GNU/Linux 11 (Buster) LTS:
[DLA 4308-1] corosync security update

Debian GNU/Linux 12 (Bookworm):
[DSA 6009-1] linux security update

Debian GNU/Linux 13 (Trixie):
[DSA 6008-1] linux security update

Syslog-NG, PAM, Corosync, Kernel updates for Debian @ Linux Compatible