[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5101-1] libphp-adodb security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5101-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 13, 2022                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libphp-adodb
CVE ID         : CVE-2021-3850
Debian Bug     : 1004376

Emmet Leahy reported that libphp-adodb, a PHP database abstraction layer
library, allows to inject values into a PostgreSQL connection string.
Depending on how the library is used this flaw can result in
authentication bypass, reveal a server IP address or have other
unspecified impact.

For the oldstable distribution (buster), this problem has been fixed
in version 5.20.14-1+deb10u1.

For the stable distribution (bullseye), this problem has been fixed in
version 5.20.19-1+deb11u1.

We recommend that you upgrade your libphp-adodb packages.

For the detailed security status of libphp-adodb please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libphp-adodb

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=/KVi
-----END PGP SIGNATURE-----


Reply to: