[SECURITY] [DLA 2548-1] privoxy security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - --- Debian LTS Advisory DLA-2548-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta February 07, 2021 https://wiki.debian.org/LTS - --- Package: privoxy Version: 3.0.26-3+deb9u1 CVE ID : CVE-2020-35502 CVE-2021-20209 CVE-2021-20210 CVE-2021-20211 CVE-2021-20212 CVE-2021-20213 CVE-2021-20215 CVE-2021-20216 CVE-2021-20217 Multiple vulnerabilites were discovered in privoxy, a privacy enhancing HTTP proxy, like memory leaks, dereference of a NULL-pointer, et al. For Debian 9 stretch, these problems have been fixed in version 3.0.26-3+deb9u1. We recommend that you upgrade your privoxy packages. For the detailed security status of privoxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/privoxy Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmAfDj4ACgkQgj6WdgbD S5ZEAg/+NskIauvdbma/FPI3vF7Sw/ORD5YxbKVsd4CxHHKJzzfUSrmkysVj73II lQtYr4Zs3O7u/ILtzwwg5vASmhzvU24XH/543igCPApwd0AUrazfrVvfAji2nxfi Ty9d91GD8K/DhPcx6WI7s5nPs6ihWaHh8RRunDrQY9J6R32/tMqaYCV2S7d7BLSV KNc0WYYIVYXQ1es2Zs2S8c3Phf1MU+YsY/cLnc1doezxIvlfnuDoxu9pL78ogilw 0meIAz3RXAvepDeawDtgwTf2OeQjlEkcCwvMkyyq8Ww/VHhgaFAWVIRprpWYgJdr kv/rNaSJ50RczCM0ZHE8RreLQ/LepeRM/T28Pym+QVzVl94mP+l2t3qutIq7kjki mN/ef5nAGODNJ/b8Zb6refQY3hBsZGb8Kct69MKgBqSaEPNqv/yuSB44mSvLD4MS +1YwScNG4GEayPWCPCLulB5GEqTAx63bdmFQu61cxh+/KOfP06GhdrRiwGYzN2SH PzVs5QD2dZgIFpLt24C2TYlmXcX1zYYT/9y9lzPTmx9clGBb7MmrHKF6LkMaShYV CZBhHGRNItcGA4sGotwrlr+skBTF5D4wG/ADq6BjReXD4rJsKCktoYxmw/tfmm8V FyN9tHwngYzOGs/m9grgkRh3pLoztJkHuyVlSENo5oMvfNtVD/w= =A8d7 -END PGP SIGNATURE-
[SECURITY] [DLA 2547-1] wireshark security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian LTS Advisory DLA-2547-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk February 06, 2021 https://wiki.debian.org/LTS - - Package: wireshark Version: 2.6.20-0+deb9u1 CVE ID : CVE-2019-13619 CVE-2019-16319 CVE-2019-19553 CVE-2020-7045 CVE-2020-9428 CVE-2020-9430 CVE-2020-9431 CVE-2020-11647 CVE-2020-13164 CVE-2020-15466 CVE-2020-25862 CVE-2020-25863 CVE-2020-26418 CVE-2020-26421 CVE-2020-26575 CVE-2020-28030 Debian Bug : 958213 974688 974689 Several vulnerabilities were fixed in Wireshark, a network sniffer. CVE-2019-13619 ASN.1 BER and related dissectors crash. CVE-2019-16319 The Gryphon dissector could go into an infinite loop. CVE-2019-19553 The CMS dissector could crash. CVE-2020-7045 The BT ATT dissector could crash. CVE-2020-9428 The EAP dissector could crash. CVE-2020-9430 The WiMax DLMAP dissector could crash. CVE-2020-9431 The LTE RRC dissector could leak memory. CVE-2020-11647 The BACapp dissector could crash. CVE-2020-13164 The NFS dissector could crash. CVE-2020-15466 The GVCP dissector could go into an infinite loop. CVE-2020-25862 The TCP dissector could crash. CVE-2020-25863 The MIME Multipart dissector could crash. CVE-2020-26418 Memory leak in the Kafka protocol dissector. CVE-2020-26421 Crash in USB HID protocol dissector. CVE-2020-26575 The Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. CVE-2020-28030 The GQUIC dissector could crash. For Debian 9 stretch, these problems have been fixed in version 2.6.20-0+deb9u1. We recommend that you upgrade your wireshark packages. For the detailed security status of wireshark please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wireshark Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmAe/OcACgkQiNJCh6LY mLHeUxAAprtNtAcO4sZ1bVL6OCpLZyd0HxQ5lFPFpvZWaCzXXDcngk9419kfVDFI /tbgssx0HKVhcyrqTyb9JJ+WIkTYLt01aR9JmGZX4TBzu2n3el/qyp66iPRhAibn AtEGIy6FVvqoTXEGTJseRVMssPXjdNKTlYI9qCdZd/UbGS6yhjvjz3BEWTb66C9A dBpZrOIEO5kMotL2tahWmySvqbxfL7W14XNks3o1d8IK2hJg0YZi8+1InrIYFmRl FF+nNTswxHfEerR4r893MTFc7mbX+B8ehYfFBQpOSKquvP04f/k0sJGOuatg0z5s XGQ9PDKEbW0dSH9MGghw4UsUEvhpkGhf1z/iEFbffY8bf0Yq18j/+27zTmg+arV7 10NGXnn4qSg6MZ0wQFxo1noTerhXIAW/6+Uf1KrG5SrAEH+Pp8sJsrALRog7lPa7 bQJaqWsQdyfNBTuoPmKjQMkJtr5Lw0N5v+ro4SB0g4I2KGRYTaTD9bWq4es7jHD6 IpcLx6HO2uZX6osTiErZVcTDDYy23EDe/Tu9p9PF1TN3ACybMQfaUcov3zfRTnlI ZeWJOMOTx47X+b11uVKETp1eGlovYRuSnfukjp5amVFITcn8lB5rmzhqp5Dgo14p Zcr2ahh4LDTO9NFliKf0Dh4wQstehE6f94/mkqqxOfakIMMZLJw= =ds+T -END PGP SIGNATURE-