-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0312
                           lava security update
                              20 January 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           lava
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-44641  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2023/01/msg00016.html

Comment: CVSS (Max):  6.5 CVE-2022-44641 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3276-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
January 19, 2023                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : lava
Version        : 2019.01-5+deb10u2
CVE ID         : CVE-2022-44641
Debian Bug     : 1024429

Igor Ponomarev discovered that LAVA, a continuous integration system for
deploying operating systems onto physical and virtual hardware for
running tests, was susceptible to denial of service via recursive XML
entity expansion.

For Debian 10 buster, this problem has been fixed in version
2019.01-5+deb10u2.

We recommend that you upgrade your lava packages.

For the detailed security status of lava please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lava

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=9nAl
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBY8oYR8kNZI30y1K9AQh/FQ/+IVsmL6mS/MTg9Nlg50yEJtnXn8IaPxbx
wUxYTM3rwS9Uf7yJL9qcPw7bfZcyaOWfo6fCdCqMItEYGR+7YyqwnTSdmRUDEMSS
Nwees/LnDBRbTClweaqKQzBDXuRbeMVmYK5yUUyk0/Wcl0I6bEcjaUuYX+BxIigf
Oh9QLvDPmAP8gKUw2RROnz9opVnoSZyJGdh5XK7OpmKMwSwWSJwjoxdzoXuuuRIC
ZEb4zT+g1NnUMM4y/6L1Hbeb/oy0FKKSB0bZBa5FtcfPtowMN2qnOxRy87k0r+ZA
eIc8TyQTtBrovzpqUQ+0tFeJq34anYaf2KzZbuD8oSBfKJUiqQQFBPEd1glTEvOw
fR2q5lwq0837fnd0M9u0/kE/j8tX1dxCgSW2ejVmn5jnkyTiBxPjXWKDJiIKf+PN
njJx480zB22GnK0LUnNQW10Q1kxPJjG3ew6sPmsvSItGMsAqTZwpPavNdCY6XVla
BaJLOzktARLpNnAO1nJWLY10v/l8tIw0rqrwMr9byTW4jB3P5hOLjUhKIS80tB/3
6f2t7Xa8YQVDCQGQ9mk0+IEJdiYKj3bPJa/w3rtGszdhuxEUA1I9mBBjCGwikkD5
gcpQiQcBsCXYATbFcwIK/zA1pQpWninPs6aJOftnxMLi3Mcnhs2pUrMKBX/5bIZn
eKop1Vow4Ak=
=/J9b
-----END PGP SIGNATURE-----