-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5436-1 security@debian.org https://www.debian.org/security/ Markus Koschany June 21, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : hsqldb1.8.0 CVE ID : CVE-2023-1183 Gregor Kopf of Secfault Security GmbH discovered that HSQLDB, a Java SQL database engine, allowed the execution of spurious scripting commands in .script and .log files. Hsqldb supports a "SCRIPT" keyword which is normally used to record the commands input by the database admin to output such a script. In combination with LibreOffice, an attacker could craft an odb containing a "database/script" file which itself contained a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker. For the oldstable distribution (bullseye), this problem has been fixed in version 1.8.0.10+dfsg-10+deb11u1. For the stable distribution (bookworm), this problem has been fixed in version 1.8.0.10+dfsg-11+deb12u1. We recommend that you upgrade your hsqldb1.8.0 packages. For the detailed security status of hsqldb1.8.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/hsqldb1.8.0 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmSTbaNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQVTg//R6xPJvWIgXS52aaxr0ZAsjmmKgROqyRekmbNWv0tHiPvctpk1NcxRhkq SbUZid8oYTlnOqq3AY4/22LoW6KbgCun+ZtAF0sFU4tKI8LjLFDQREJcZ5eB5Sv7 o1BvOSH9MVE7EZv5CFKe0lAyfbD51Cys58sKAf4JTlbO3wEigi4IYTrxAiQzcV/E b0a1dYKsQP5kh5mTlcL7nLC5wKWBaGQVXGI/lXum4C2t/rLCQyMkgVNedaXmkNK6 zk5iyAZ1VVDIAHw/nPiAAf6bMvzUmpQ3GBOmeyZ8X3XA4xJw9Y4nywKUNBZzt4nd puCNyK+6pK9zHpt7zrsiJXRBNL6a+Fjuf66Ral9zjgAsCbQYEE5MgTRbEOUQaXIn yEvKfXtJk1uOMC9Z8kwDQSLYYbfOskuNTarRwoZxRTj1ZVHjfCsaXY3UMzmBZZVy uu18jdkZpFlf4B8lhsPUZAL2csQTD8AIsfeXYHaCA5/tTeJhAxNh0UvbLzDYNpK2 UeBJiOrLY7qNyzQv2y+pG5o7XPcG409mU3t2kF7gXBi3ntfImHFkyNgusUU21CHP QLOT9cnt05aSij2H1iEWs3iYX8v67thNSYb1fwc7+yXpAgMx7uBtR97gUxJr/ghv wG9TZcudFj6B7qyAoA7x+3gbt0ULSAZsTxZgQXsu0t72GKqK/X0= =rINr -----END PGP SIGNATURE-----