-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.1898
                       libmicrohttpd security update
                               31 March 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libmicrohttpd
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-27371  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2023/03/msg00029.html

Comment: CVSS (Max):  5.9 CVE-2023-27371 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-3374-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
March 30, 2023                                https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : libmicrohttpd
Version        : 0.9.62-1+deb10u1
CVE ID         : CVE-2023-27371


An issue has been found in linmicrohttpd, a library embedding HTTP server 
functionality. Parsing crafted POST requests result in an out of bounds 
read, which might cause a DoS (Denial of Service).


For Debian 10 buster, this problem has been fixed in version
0.9.62-1+deb10u1.

We recommend that you upgrade your libmicrohttpd packages.

For the detailed security status of libmicrohttpd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libmicrohttpd

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmQl/PVfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy
MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7
WEdeJQ/8C1CsqBK80uJHoPthtut8HoE3iRRunEl+UUox914bfLRIHeuYOleOdXi9
11hUFMAnbgtYc4tZSs/pN/rRzjg9HjsZpDSlkTSyfRK0TsMBmbfPfW7xU9p72wJs
UY9UmQVXDX82Fuo9oeylsUiCuclJpYxRO/UwfhHM3hH4Ioukm6hQH69R/MFoAf8r
de5v2fXEaGsGBzxNCgorSd6iTFoyrc20+m7/7gM5tvQtarlaM+oRynU7QlFjvZVO
G74Avfnx2OBVbnZqhbQeHG0S9arJw+wbtDZYijXgwihDoEPnVpHQ5shVgfpSQRqA
9UTCJhOPQ/UQHyXTjeitENUNMjTqZkABnWpg/qvAhPEd2xi3BO6Ea+miJEWVrhFW
AZ+EAcua1G0OZuhdg/kPZgoECs1kubTLgcQXj71muQAELCjO3x+MNQj+2CT4vrjc
3rX+Gt2m6bv9Crb8vrFssIVc/h96b6VVnYuuY5u9gnbjr0peVTPSiuTcNkS4G4c8
7bNbHjdIqebu2wzawOMxFlArSYuRPpGRE5NhJk9XL8HUBFM3+Dh5NgJ6nrvEyi91
40dzlmfaYQc66ki7fQQ5RPWPsE+cvTWFySy7y2WRCXT+dzpttZWRSPF9ZdJFBW3L
Ci0bVn7AZ/R69U7hXEy2OIiPlKcpLAUlg8M4dfE60VPAi1gFKX4=
=OLXW
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZCZJuskNZI30y1K9AQjQQw//XjK9+lenL4S32IDfBM1u8aWD3ecyiv2n
GgDJcFzbaNlQ26jeNyWg2vM6Qi+/FH5UpLodhV+dujncBbM7PntZ/pTtpptKO9e8
z+okvoveq9nqrcy//CelEPOOF5vORHStC/M/TMTiBAdr7ky0dj7U0q8BoZB7GlJ1
sgrQO/a3379P7I6nX12/caVS8ZmFL+R6t3i02jXvsiOtlOk8p2sVe2gmjg/Bj69+
mL6oTtOer/83/6J7auLkVW9YVAMKpEBsOOjUTVdZqWL/qUJrXaSN4TzzBYadq0sv
CdaR9sNQpPsIPNTzugSX/4MelQ/U12B0Yhs8PiPXIZgCCz24zC2q8wN56SODQaEv
9cLfyQj+E5otubtZVdDVDS7wzHql6tX8ymzc1cqlhZZHEZOW4g28BaPHEfZhrwuO
qQh3TOAxVXpiEQ+2X7omVU5S1ihcudnVqvRuc1tgrPAnGeZTLbsiMFenMMwrOETR
rJUqIiXi/W9PNPRAq+IgaiNXK132ZWYaf1WatArCvdDTw1z7pAPLfkpGJwH81tB4
oqJeK3TzfippAsHH53JYiR/9EMGoqqCFwCUUYJLSwBaK6B4cdux1vbS80/qxXLk3
LjTNXDbKkLo8wm6J4th1/vmdd2NUnatZn7t5fkI8pp+96rJqZlqHcAb32ctbqI3A
IoqpVZ2y9do=
=aqKi
-----END PGP SIGNATURE-----