[SECURITY] [DLA 2492-1] openssl security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2492-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort December 14, 2020 https://wiki.debian.org/LTS - - Package: openssl Version: 1.1.0l-1~deb9u2 CVE ID : CVE-2020-1971 David Benjamin discovered a flaw in the GENERAL_NAME_cmp() function which could cause a NULL dereference, resulting in denial of service. For Debian 9 stretch, this problem has been fixed in version 1.1.0l-1~deb9u2. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl/XKcIACgkQnUbEiOQ2 gwLSzQ/9E5zulPuTtiJy9a8wFLV7MqUjYlDEK1UM5CLh3nS2xRhe45pL1jdVkPoa SOSY262SO3tsGtrf+py4u/wYLK/JHL85g4vZFqCId+BLAa2HhoGAIR++x+tSq9A5 k7LLWfvfFiCgPLsbOLiZlUe2sgUFl3UjW3tJ4tjP02Cj0gjlEQpOG5qbul/lThCP GBOhsO55lljyrY+bBmWIlpF/PNzXxu5b/4dYetlTG0ZklS1RO46sHmLkrZst+Lab B30c9mKKOd9sCoaNA7rMMgbJP8vJOmZGdOyJxLjVKo1z6BcEXYjhyYt9LamtWImt 8+9v0QKLUWQNW76u2cy9itd5sqA5rqUfzkv9zBix6bJswytNVCU45KLvQ7Y4M9Qq xF2LKzMPNbrv1gK5KTwVjamLa3nXPvtKGM6ZvopONwVyFgiBNXzGsLmd7v9u2YRU qqbFPt7Elzc/MDQSSM+dROWJfATjALDBh1g7pEeNqQRtK/ZRAkZdMO4YG38rG43L 8rmozg3XKzHASCCVO561kGtbyjFHjgCAmlPVJqu+0mwTM0W/mI09qSsUCSSYkvct 7HMHsTO7UwHEuTGTs2qNWoC1z78MB0P/Wrwdt7do7bBv/Epm4a6rz3N/QR/qeIIt NS3ihsh8hxBeh+Xo/Yf3J1B1pkWc44ZC6inf/gKR5ihj55cCKyc= =vciH -END PGP SIGNATURE-
[SECURITY] [DLA 2486-1] xorg-server security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2486-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort December 09, 2020 https://wiki.debian.org/LTS - - Package: xorg-server Version: 2:1.19.2-1+deb9u7 CVE ID : CVE-2020-14360 CVE-2020-25712 Jan-Niklas Sohn discovered that the XKB extension of the Xorg X server performed incomplete input validation, which could result in privilege escalation. For Debian 9 stretch, these problems have been fixed in version 2:1.19.2-1+deb9u7. We recommend that you upgrade your xorg-server packages. For the detailed security status of xorg-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xorg-server Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl/QpqQACgkQnUbEiOQ2 gwKyxw/9Ejv+OATwMLjv49+fdUGLJpbgtlRvbgDCVC16JSyZLO1KSRRR/Hi/u6Ag ReWFQv2489CFuRpc5rZTAGfcGlaV55eUgDOwMeCggP23B8sHzb6L7OasLldlauni ov9ASg+ui/sjCdUS12uB3Ni1qgkcr/ah5PP1D1X7wxAqYJzasFUxTlqBGgaE4i1R YZELkEDpSHJAJ1iR2Oyi5/OxMQqY/wlWNT+QtGF/xjlN8pw9iZioZO1efC5g1UvY CkztRafWw94Pg5FnAd21rZEhFH9Q6+0Tg9k4mBhbPg3TMni1EtPXdJjaxY1jUvx0 bR3xQfUC4SxK7c/DSMCbG8xn/ny0UAjfLDMm6ucR7sjncbvv47WowQ0CyfuFc4rp HCOJnW/gsLH1I/3zK0B58D6heFklU0ee17wDHtO76at/A+2LmoDrbpKKTIk6fwUN Zyvccb8WpEsSCg4a2OxP9syG0IM9yozs2jMfcrcTMD2Ym5bwsMJIDahYcoyJQ0GP R/3+hU4HKjutcfPlNTvoWxJLtghaaGzVZlLQO2fvry8ddB/3FYqncUq2tHs6B+jX JTmis+OhD6wQljOMVVwrYfRqHkxXcsDW9SW2XUk4Lm1Pr+o+S8AuTg4cKw0K7AyN 7PQHuYLpqBCz2NQ4/Nc+Oo2KwCl4SPzLURblm3qYMneuurzl3+c= =lKsx -END PGP SIGNATURE-
[SECURITY] [DLA 2479-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2479-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort December 04, 2020 https://wiki.debian.org/LTS - - Package: thunderbird Version: 1:78.5.1-1~deb9u1 CVE ID : CVE-2020-26970 Chiaki Ishikawa discovered a stack overflow in SMTP server status handling which could potentially result in the execution of arbitrary code. For Debian 9 stretch, this problem has been fixed in version 1:78.5.1-1~deb9u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl/KGlwACgkQnUbEiOQ2 gwIVTw/+K79o945orQvkdv49vWpXdP0m64wuQcbECdNApXpTL0DNc27JMHpgoR2d v9j2TFdF+24aIrOngs00DCvyazTVyCdcop1W7fBjDPk+prvSgP5sN2NJSnM78STF OW8xYUecSXQmq7g7EKojvJks+K9ZRBIFTyS41GYdQB3AfbyoLITKrqhD/Hb0CRnQ tsRvl5KBQFNSNLG0qonrzNNz3gZmgylYVaUTqhJdcyuEjTnl2n4BZYrCx4XMnzq1 YyApqDoSfLnqMrB7to5C4oxE1WgZ8BaIHrtl7Vm4FQ/YDE1nhMYSWLJlaNXG9igI 3L1gOJ939UpuJflPZWUZtPaXKyn4neETGXy1RA0htymxRjBCdqKAUXe/hg0ClfCt zAt9R+hYts5Le3X+d+YMYwBu9zuPa3toHvnMK34zRjHPQf73KCg+VkWleuag7XlQ vf13GuGjfqesdHHIWLCgSzTV8IFfOK7MEGrHUWNQG0DpJPgCUJ2SZ4ojmCQbYDK1 FSCUf0sCr0pYSyF7yqy5zicBECtwVYQzB6qIIQlCZJxn/KlatJ6VP/gIa2TDlBYg LcpSAuuFK1/d4R0+fGlJsnd0/GTGNp4c5DNsqBTU0QiAMdnzKyRLV8rvdeBTh+go UfWpiRs+2bMV5fa353IorQmTqoE+fT4pZy3YweAJ78Mwm3HmYA8= =/MBt -END PGP SIGNATURE-
[SECURITY] [DLA 2478-1] postgresql-9.6 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2478-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort December 02, 2020 https://wiki.debian.org/LTS - - Package: postgresql-9.6 Version: 9.6.20-0+deb9u1 CVE ID : CVE-2020-25694 CVE-2020-25695 CVE-2020-25696 Several vulnerabilities have been found in the PostgreSQL database system. CVE-2020-25694 Peter Eisentraut found that database reconnections may drop options from the original connection, such as encryption, which could lead to information disclosure or a man-in-the-middle attack. CVE-2020-25695 Etienne Stalmans reported that a user with permissions to create non-temporary objects in an schema can execute arbitrary SQL functions as a superuser. CVE-2020-25696 Nick Cleaton found that the \gset command modified variables that control the psql behaviour, which could result in a compromised or malicious server executing arbitrary code in the user session. For Debian 9 stretch, these problems have been fixed in version 9.6.20-0+deb9u1. We recommend that you upgrade your postgresql-9.6 packages. For the detailed security status of postgresql-9.6 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/postgresql-9.6 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl/HdNIACgkQnUbEiOQ2 gwKcbQ/8D8WHVAYZS0f89rOUfW65vzxj34ntW1lJnoctS0KWQuaxD9cSxUGsmosB TfwjjQ+3v2+idcWrX3LZycGwQQwkyzxVmx1eLkmZabIBxxvIodNGn59bj4TftJhj sCFcRP9KxFYysfhEWsso1P616OOUTHTn3VUMnCAWGHkjkTHB62dCsAPCtvsPXSwe R8wKm3av88w0VOpBRR95ISFKqdQI8cy/TXgSbTeynBK82PaXrPUMB0nw5zCAxv2B lAW/Y4pTfzHNTtj2PJIKDiN5m9EFFfl54CBn8lYwBWBjbVsA8miue6lz8br6Z8A/ OLxJZXygJ6+L2zHDdSLswmKi8qc39f0m1lSPIpE7wJxUgrsa4cRKDqTYBhXfUIqC PN8Pf6wGv66wADzarqIiEZSqE89fdEjW7UJ1lgoA9j/YIT7D+hfw051Nrj1d/lEx tPCGMKo7X2p5vltgiMgQQ+d/QvdZPybmfLKY9i9g3oVd40uZRLbEsgVbIRrNaeeQ F8BMxblpfD01en7TgO6Gm/rQNGLrZV8TzU4x5OUEtGxvaP3g9bAomyR9Cio3pMHs P5c6yybyD2JVluhsxwbMnOBlM+uAkqxLkeYQkN80V8MBaveoD6jdroPZk4d6hFsn x3Shs6WZ2QdS9hHCeZSVwf/+KVTAdzeHknotV8hF/utgLqlREBA= =d8YE -END PGP SIGNATURE-
[SECURITY] [DLA 2466-1] drupal7 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2466-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort November 27, 2020 https://wiki.debian.org/LTS - - Package: drupal7 Version: 7.52-2+deb9u13 CVE ID : CVE-2020-28948 CVE-2020-28949 Two vulnerabilities were found in the Archive_Tar PHP module, used by Drupal, which could result in the execution of arbitrary code if a malicious user is allowed to upload tar archives. For Debian 9 stretch, these problems have been fixed in version 7.52-2+deb9u13. We recommend that you upgrade your drupal7 packages. For the detailed security status of drupal7 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/drupal7 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl/AzbYACgkQnUbEiOQ2 gwJvYw/+P84Qttlwidj2uSbKE4TBkuC65jkURt+xooUquyXjFFrlPd0MrY8Wd/5A euNYHfUGNf3eKs9zqsYHJrpEU4YgQbFCrFs2+wMIr+2q46HWBSozI3TvKCy31T33 VzkEBOWbmBQcXD0HXOdLeqSKvPs7zP8KLw6/q6NfPqEtTdbKsbvV8dGnYckoyzSx JTj9cSt2gvLR2tevAv9wsejmZjZ3Fj1/licE0aobB9sX65lH/aaL+kJnO0nN307N uJ2oot7A28EePk1Shmv08vG3660kiVx3inmBoFk4eZRfEmrym+lc0gg5PnFCYHwv CgL/p5WpymzoRZrOMbseWhyFJR3DDiIrgjTnzj8JnEkKRFb0JXLSlySpEHuUG0+4 cYSbwybC+2s04i4LM0Wwqgyvnr6x4kTIl+BY6+Kv6i5YHU8NZMwCQlZ1iXfUIyVD 0/BrAUfAiFSLFWotstBk8lzC/V6Uxsr0xhIzHU7L7SL27UgU1QY9u6aJrfa50zWI EIloDYHbbbuRlaUTQRXznFHa26o9Otx9xsa2r2kazRcLF04d40uCEUbCYeHquZ94 AYAf1gsNq0XojUT2BBwcvaQVHwMlLYj4B0AjMGlhHYWpz5MctPmb8UGGB3UFJ5vs qYwQPaON0vc5zZo4dKM2ww/wuP26ylyuIHYAhr8yVG6qvtUZSfg= =FYjF -END PGP SIGNATURE-
[SECURITY] [DLA 2464-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2464-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort November 23, 2020 https://wiki.debian.org/LTS - - Package: thunderbird Version: 1:78.5.0-1~deb9u1 CVE ID : CVE-2020-16012 CVE-2020-26951 CVE-2020-26953 CVE-2020-26956 CVE-2020-26958 CVE-2020-26959 CVE-2020-26960 CVE-2020-26961 CVE-2020-26965 CVE-2020-26968 Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. For Debian 9 stretch, these problems have been fixed in version 1:78.5.0-1~deb9u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+7hwwACgkQnUbEiOQ2 gwItixAArrk7sAPtGAaSaY92gmuXaibWLJf7HRwEeIWPzAEzHwXp+j+Zq2KjukIS oxy57HQaQA+bq0yeH7RWJUjmxc8F+6Y0gX+UCsh+PNGXswDi0JwR1Py4H+X534Zc Ja7xG0doV/hQDTCC+hjHw+f6veS0FizRmA/brQXvum6sWHvxG7jr+7rC1wvOcbLC GcL58TPovd5Ip/tZfd5I3APyjepTm8YeS0MmXTV/X3oGW4xV0+70i6n0pFi5KQzv abPBVu1dGWhL+xNI/F53FxpFpRIo0GMUylGceEQgrGFmrXQhRmF9/4ORBy23Yn8W SEKg8bIDsHX6sl6uVW/vZJOzWuz4rjbgdMLdbKgPVW6rF4Wy9OC7qovWVSoq9DOZ hCuJ5t79XBhZSFPMQJsH7UOVUACnT6clk2gHXHgfltfQPTj+tWwZg3xERe6OOvfT jtnC/7qglvpOa9JM0M6Pwa/Odxjm0ooUUj3vv4SHeuqz9/Wm2tcc+TyA9BsxKJ0l AlY3hHBEU0eoBwJpi6sgWHiuKQ3JvRFIbBFZVkJCl6vSYAljuZEEfHNK7fQoU16F CYBM4uCti4d9VNaPZCnZkmwRZI5LY8temuO/Hai62WHCf6Vvfl+i517NQQHwDoEH 0lIUi2pEMNEKR6+0MJRE9U/wooCJuWVEPfTdjpS7Mp+mX+5byv4= =4vBc -END PGP SIGNATURE-
[SECURITY] [DLA 2458-1] drupal7 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2458-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort November 19, 2020 https://wiki.debian.org/LTS - - Package: drupal7 Version: 7.52-2+deb9u12 CVE ID : CVE-2020-13666 CVE-2020-13671 Two vulnerabilities were discovered in Drupal, a fully-featured content management framework. CVE-2020-13666 The Drupal AJAX API did not disable JSONP by default, which could lead to cross-site scripting. For setups that relied on Drupal's AJAX API for JSONP requests, either JSONP will need to be reenabled, or the jQuery AJAX API will have to be used instead. See the upstream advisory for more details: https://www.drupal.org/sa-core-2020-007 CVE-2020-13671 Drupal failed to sanitize filenames on uploaded files, which could lead to those files being served as the wrong MIME type, or being executed depending on the server configuration. It is also recommended to check previously uploaded files for malicious extensions. For more details see the upstream advisory: https://www.drupal.org/sa-core-2020-012 For Debian 9 stretch, these problems have been fixed in version 7.52-2+deb9u12. We recommend that you upgrade your drupal7 packages. For the detailed security status of drupal7 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/drupal7 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+2W0MACgkQnUbEiOQ2 gwLmVhAAroo0l1+hEh1VZ2QNj7kEoffcXZ35nvSXtsfFDDJcVarojRrBAHbK2BYa sDljwaWMlo2chKoEsPNoXPCH17TEgyTHguU2YrX559Z1bDF4/Wj1rXEBUzwRl/Mc uh5fXkOzASfDxnS8p1e2Qh/ksnIf1Z1CC7DvzdOfBOmqQs5s+3zgd9uYiikHX8NR Ucbh3Ji2doCrYh3ZfH0eTujg7KLySjp4hdb8ocgQLMULV8f/ybdm7CA8eB1SWSj0 cbr7qjDye3Ig3xFvdBmUvRXrBGKakuN8c4rpV+tIKrQiOyARubsH0IMfOP6aJVLl Zn9cdNrGN6DJd2LVXfmJNcyci62kIL99q+TeQntNwYfRASyWHLyPylYmJhrcnK++ EJhonrHd9SorQkbvlpDn/C0E/zILoA9fENygTb990mSnPSqnsjlWpbkofpGESIZJ JGmXJfV6vTuZ5ms+rcnp2w8+S8gvZQhDxZb01U+N8U+3EOYGkRi0K2P9hb4SboXg pUSGYa6twbQDm5XzReVEipAuqGSyH22agCckGAiZmluz3iikgQF+GYfa/n/XQirB zq5GGYyiZOvkcVg5pQWGgzcj7KZxDvnvyAY2N+SaN2ohqWYMKgN+Z8pyc3TSHd7G 3NqWZ6BmNJo6A24xn72fmdJJcvHlbw698KgcHgTTBeQjs5ImIJc= =r4OE -END PGP SIGNATURE-
[SECURITY] [DLA 2457-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2457-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort November 19, 2020 https://wiki.debian.org/LTS - - Package: firefox-esr Version: 78.5.0esr-1~deb9u1 CVE ID : CVE-2020-16012 CVE-2020-26951 CVE-2020-26953 CVE-2020-26956 CVE-2020-26958 CVE-2020-26959 CVE-2020-26960 CVE-2020-26961 CVE-2020-26965 CVE-2020-26968 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, information disclosure, phishing, cross-site scripting or a DNS rebinding attack. For Debian 9 stretch, these problems have been fixed in version 78.5.0esr-1~deb9u1. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+2Q80ACgkQnUbEiOQ2 gwK3/BAA0eoz1b522rgykpc3q1x0bWOrhOl/4IXO4ZqDvXIQy5ucmtNHDjJ/W5nQ HTsdQcN0ggRAySz4ezfXY4sv/ZVsMZS5fY5OlM5tQzY/HGhB+fGwh4fOkJ+vaNVB 9eBNIX7gOmCj8/JEeZeygSCnWYjeOfHqgCjEpJo+qCfbfXlo4OIME/Qjij1VFT/f iIKZOzFBVpcJiT36yMX/OguAG4A5MZ9gZ2RyIIPlP3LQ51/Du7jORTPWL85xMGTZ 008zjCQsZC2yGqOesxJGZRt357ZcxV/obDywC6ktsy+OpmMC5bAnpTx8n5Sl6Gfv Mc/lfggO4K42y3W8w5QwbK+67yKbIQr3TVkz+se9sqDFT4iS4kl1RA8LPSytbZoh /qWK0+UC37azUbG6sDxzsNW/1BZgVAOfxGMgNGLUCQ00IM/oMzBLF5jwHvymGFHW RqzMLK9HaC2OelpD7B56o8DHZnik/WcjBr4bCwjDwtJre+lUr+e49gQk7Y0OVMnJ Nw6qWbg4arGQhAgzy+BDniQrQ7OFPuXfVaF1ESVXIyYWTX8HUZYv2GJTLxyiFfZ9 u0YvdYPDUuolLWOBEzunVdCnGgMneZjFAFvQBG33OWc74pmh6jha8Ewb9utklSp2 tfSMKU+i5wqUmyjOVHjysnlBbAwBaA1/NRxlBvJDO4LorBLdGX0= =sHlv -END PGP SIGNATURE-
[SECURITY] [DLA 2450-1] libproxy security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2450-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort November 13, 2020 https://wiki.debian.org/LTS - - Package: libproxy Version: 0.4.14-2+deb9u2 CVE ID : CVE-2020-26154 Debian Bug : 968366 Li Fei found that libproxy, a library for automatic proxy configuration management, was vulnerable to a buffer overflow vulnerability when receiving a large PAC file from a server without a Content-Length header in the response. For Debian 9 stretch, this problem has been fixed in version 0.4.14-2+deb9u2. We recommend that you upgrade your libproxy packages. For the detailed security status of libproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libproxy Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+uZ7AACgkQnUbEiOQ2 gwL3wQ//WJYXoI8N0ZqKP1zq6Yb5oso4kCz1h1SbZZVmrXdJ627qsxdBU0Lgmn6Y yjaQ+gwSUiCGn/N+m2VDTCrqQrcs4dBfF/nn8lxZdOAXMTIA70Y2IknTrdn7jvT+ /WDcAJyB0Y6aROHlSka/m02G2cQWb3TOGryZPmtA9SzW/MlZ0E1yXRzx1dPvpF+R 6KQC0lZAU66Rx5dYG1sioqMWhVTXVKVHsC4cB7EZU3ljmbGaSDyz4bvL+1uQwsJS dW5OweX3ucX4/C9e93P57vkw1kj37i4SaLJMQff/J5w/6YdI1Qfh5d07P7J/zxeh kD+Q5GPmvm5r7tBfQmdSFoVAZrKH5nOfjlGNQQYa3Da/jQBmQwGDu6dInWZ3YqgL 7TMPHnH7GMPI5XWb0ZXJFpo6xThzJC+9iVsT9fOKPfcVwDW9i54N6r077Z0yp1m2 sIy6UWT2RGk4VQeToMoQyj3zk8VwKIj9/6RJUHWeMsOCxuh1GmYYnoE7IL2JMwWY LGVkeRdb4po10fO0Qu8crZz8MEpQjaVtpvs9u6uPSwTL/7GQUlf3FvsnuWB6D770 4k98ipb64+uasxvv263flIdC5MgQagbarJ3+cFoxAE0T49KJSjNDs37pTTaawEog qlMJCXBKi/SPzc9PhJUTTHgvaC/qCnobG6TXjKJQYvPJB8iaKYU= =Cz0I -END PGP SIGNATURE-
[SECURITY] [DLA 2449-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2449-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort November 13, 2020 https://wiki.debian.org/LTS - - Package: thunderbird Version: 1:78.4.2-1~deb9u1 CVE ID : CVE-2020-26950 A use-after-free was found in Thunderbird, which could potentially result in the execution of arbitrary code. For Debian 9 stretch, this problem has been fixed in version 1:78.4.2-1~deb9u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+uYucACgkQnUbEiOQ2 gwLDKhAAqdyQDtNJXYBQ/58BuR+4tUQ+84lk604Cn0D4rPUW6Aa10px32/ybbUKC c1Ch5qFVNsu9bKdfX6EsrWL5NdwyRGW6F47PsSmQkdT96TuvZP3DzBfChcT/SIUv PXC3H1IM1f6H1SJJj5vyIS2hwXZsJHn1/hed37+O7UFrY3o/CaFyApSsgFqRJtCp dVXtWaEsru9CgWbayGmtAQQWEEPCKGg80UrgUND2z5md3/ka9R9sh9yh+/hJtYy1 SH3hQEOrawlaW2Hww9aX+LnNY3aUg+Xz1oMG2rKhSWv6FFnyKduYMEBQTP+ogpe8 /G4Ew6ztea1Ypt87Skwnx68MjPAijOAJQr3ottITqZNJARJxz3wHUkleKp2f5+DU rGivzLVmLorD6EpqUbTHHmZ8nV48+0JYdxzX6quMCCY6wcIGnk6MGny+h70prQRN QPJOye9Cs/j9mxIpADgsmm0RtCqGbIn0Wav+6FruiOy4Uu0bXv1AsuMcLZVINJ+K +S6iOV1Bx96mAn0H0NGeGdU4zxUf5cCqQcpQMtzqzNyqNwxjH3gzn4dV9UynL9fR OYWLpf7FMTQ+bNI0h9H9AbR8dWIxfAKulINmHhW94azyVeDBEQmL3lj+wSin6aj6 NzCXK6j30sgqFWlWBS5saccO2Jo3HMwZnn91bOTQSU+9qvl5Cms= =oLqR -END PGP SIGNATURE-
[SECURITY] [DLA 2412-1] openjdk-8 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2412-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort October 23, 2020 https://wiki.debian.org/LTS - - Package: openjdk-8 Version: 8u272-b10-0+deb9u1 CVE ID : CVE-2020-14779 CVE-2020-14781 CVE-2020-14782 CVE-2020-14792 CVE-2020-14796 CVE-2020-14797 CVE-2020-14798 CVE-2020-14803 Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, bypass of sandbox restrictions or information disclosure. For Debian 9 stretch, these problems have been fixed in version 8u272-b10-0+deb9u1. We recommend that you upgrade your openjdk-8 packages. For the detailed security status of openjdk-8 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openjdk-8 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+b2UgACgkQnUbEiOQ2 gwKmMQ//UpsuIgrZlPtO5vsQ0cGna/0XeVg+6XPVN3PhxhCSP6ynl5LO+kAOIYS4 TxDKb2HZsgx39pnZy1bFZ2tbnhYUutkmvbnnzyRaILoS+FW7AjVEg+opTjQCNP/K T7D2DHuolXEce9iR47IZrCm1czs50I+XU0XlfACE/jDCB2a9B9mVLhcK9aXwSrD/ /dBeJaAQ79rKrI7u3ujqq1bwaIR2h0Y4nDl+K3XBN7pxu0lgpC3PX5rR3p69/OKY z2fApb+9f9lCM5FYyaDUu0u4lnvHhWTEttupakyPBrjWtEql7UtBMVtln/JKpz6n VWUI0jPiBcB/CvCYeyJ1nkadjnlzqdIr34HxB0jbObHIvBN/r0/6aRiu/BcBPGa8 +2UWsTnCNiQ5w5u/Vn5ZBiF3Y5P82aPnKl6EAI2GbCjun1jWwYxzLiwStQTqa0UC cKt/d1GdFxgmtzid5gqMDk9uBI/yNn163TIcc6W2ite9ZrthjhMZPko0Y1JAc6o2 N3rmaE2TEsRZbksUigmChXN/dY4rFThN6dz+lp3pXzfWBf9CW39k2C8VnPfSF1/P xkyCnCAiedTGA3zYNmfYMPNIw174dRtDTWKMzi5WTbIFuGag4wlWA7YLh5lNYi9I FCpCX9VvQUGXvQrQVnkf3paa8N5riRuWi7ba6CkjVyEyCjIyDho= =8OG0 -END PGP SIGNATURE-
[SECURITY] [DLA 2416-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2416-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort October 27, 2020 https://wiki.debian.org/LTS - - Package: thunderbird Version: 1:78.4.0-1~deb9u1 CVE ID : CVE-2020-15683 CVE-2020-15969 Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. For Debian 9 stretch, these problems have been fixed in version 1:78.4.0-1~deb9u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIyBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+XzyEACgkQnUbEiOQ2 gwJBhw/40RdeGsAFQVZZ72HDcm/jH5z7BH5VjBGjC6ZRxdtSZq2B3hewo/W0PlRm 6SauGRIT8EcDWLOg9KQL0s5TJ64ispIIRPqmaJAxVIHA6AO9SCiQjvVVY/sG7t7C yXoX/+M67HLDwZj6d+BUThqqOsUFOgseew3NtLyZun0TOrJ0ucbOEBy1TE94PGEj +5v3/SEs8ra//T1ls6XUaGnbk+RQ025vJcPKRHMMxYzspp9HYzsO8ybCRd7iDiEs hE4apepeXqnBQIjQ6gBWKHNufTMT36S7JQ0Y8gJQVS9x85pMUXKzsVnqvilK9vpH u+rWouFxEUpVi+ap6+Kmr6BAXilBo+BZlpbTkGzuiq5vpnhmDlEmdEt0q0qy8uFz gIZG5DtfMDuEGf70E2SFEh6e8OR4GYzgwIS2oieqPjc6SR8dKrFySoWe/JS6jtjS 1KFOI3YEmTi2mMU8SSxKKFuFqzdrQyV1nGfPKnJJ7qyw7JJQ3O8bceDcdds8UJ0k ZMKFXh0REKXaLaG9bcM5dS8lbk9YkhMFQN/mef6Tglws5tQOtWqsI3Acrb2jWYgw RWQp8MgG/qlKJehQcV1UZHaqmkxIIJu2KEo0pRhavWi0DC0/OpW33jPpsAxJbB3y 5VPHfoRUv1RG/k14kg7+tLsFViMBhm/cPH7OsqUsxfaw7Xp/Hg== =e4SW -END PGP SIGNATURE-
[SECURITY] [DLA 2411-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2411-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort October 21, 2020 https://wiki.debian.org/LTS - - Package: firefox-esr Version: 78.4.0esr-1~deb9u1 CVE ID : CVE-2020-15683 CVE-2020-15969 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 9 stretch, these problems have been fixed in version 78.4.0esr-1~deb9u1. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+QqycACgkQnUbEiOQ2 gwII7Q/+MBf6q8PF0cvl9XFAHLiPdGK+q6TKFPkvyYBGY9DQyl51pZVbisHFNj4Y QFSiZtYvgeAXLe1V0OlLzkR8UEan8gp2zN1HrE9I1vEcydCpK0EQ+TDP09LhSuQW kUBpDuplUaXog8GLvuiBuw+2fgAMX52QvZGq610A+9dKux57bbHjHzdngZpSB6a9 l0LH6rR6+FxARjI/AirLSg7vNtWvWA1lTYKZDejvfIYgd1OAbd+AOeccVxcTo6/5 E5Xvk3x3OuiQ9aQJPe96sauyNjVFKBcSPvZJt+St8+32b/ral2l7Y/qu+wKqieFz WxqoAFgYC08WruYTKAZP92q10VJVsn4xKw+tiubnL5lUP8Fx1wfh+sm1kwvT8H3l 7gYnaDHkXGU2XxtBXqTiGrvm+u1LXX5Ry2ED/du87Pw2L6jspgSX48UzXpsQTOuF wyqCnDAN81ImhNpe48gaWrCFc4e1t2XnMJn4PwhjmJ3P+9jCIsdlhDZ8xbiPtx9y LlkvZO9T00ZnijuSAjAmo8R5OF6dobnpuHYTN8jFrbnFDAn15wuC7iUSqYnK+rd8 WuuMgdvKqS/FFT9Z5+3oznEUJfdqcEEEkDROcWc9vFKqZ2iZt+ExRjMul7p2wdIq +0jerE5Bjs5nO8ql72tkKv54Q6E/YXCcN/0rctJltcrU+bh/vQM= =husu -END PGP SIGNATURE-
[SECURITY] [DLA 2409-1] mariadb-10.1 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2409-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort October 21, 2020 https://wiki.debian.org/LTS - - Package: mariadb-10.1 Version: 10.1.47-0+deb9u1 CVE ID : CVE-2020-15180 A security issue was discovered in the MariaDB database server. For Debian 9 stretch, this problem has been fixed in version 10.1.47-0+deb9u1. We recommend that you upgrade your mariadb-10.1 packages. For the detailed security status of mariadb-10.1 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mariadb-10.1 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+P5YwACgkQnUbEiOQ2 gwJAPw/9FgTzKb6KcDl+4aO9lEUv6FiTSsVGw8UIs1e8FD8vA/4oqfDwyNmwCRVq HzsNt2U6RH8K/sNC1E9cvdzMRA8HGE3lGC3Poq2+4iZ1NGpnt5cdzVn12NnIEoNB 3+AdQpCT/HsHi41oIYzaPpE6OyD1+j5DDpXo1ZI5hK2adH7w2sfhPtYmt7gMXLAZ on7J6VzdXeb4bjDGErTCnOg82isuvIhwq5jNJyPyqcDCVIzuEfDzuZUTX4SeJqXM VaYJXTEa0W37UkxyKc7dsX/JyuafEiaL/40Bo+VrfHpHdF+3x3jchFw5RNFMvQ/n V3iRhpLBt9GNgiZ1/1t3hRuFeexD1cmp6CLIj7a+pBCKy0nBl5b+ioRbnvfoKspv nH8OjFNybGRC40sVwfb95aBZZhmo/Wgmt6Iy0R8BnSN5tsEmdAxMgMFCAtMmbcxJ WYRxn5xApEJ6FhOu1bzZjA3Px+6nb1fD665loxgpsxMTylnhn1VXNkTcMG4SYRuS kDZmvh1Shraje56C0ciJrdT2VZwusRfPSjH3z8DlJrhuoAb+DuANnx7Z4w2vN+N2 RoYg9dMUkFaxGKKrOAC30kRIcBj2Kqp/WqFzzlp48JYfP6MbHHoEtRRa6VMJUrjC F7D0Gjm86/q0uERS71dKX/rCsSH3UmjM7Ev+W4xajszFuYJBHuk= =G3N+ -END PGP SIGNATURE-
[SECURITY] [DLA 2408-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2408-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort October 17, 2020 https://wiki.debian.org/LTS - - Package: thunderbird Version: 1:78.3.1-2~deb9u1 CVE ID : CVE-2020-15673 CVE-2020-15676 CVE-2020-15677 CVE-2020-15678 Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. Debian follows the Thunderbird upstream releases. Support for the 68.x series has ended, so starting with this update we're now following the 78.x releases. The 78.x series discontinues support for some addons. Also, starting with 78, Thunderbird supports OpenPGP natively. If you are currently using the Enigmail addon for PGP, please refer to the included NEWS and README.Debian.gz files for information on how to migrate your keys. For Debian 9 stretch, these problems have been fixed in version 1:78.3.1-2~deb9u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl+KI0QACgkQnUbEiOQ2 gwKtEBAAjr5giSel2X9DBupJ2yzkOdySWkXR0OJo8w9yJ1QyuNiqLN0aMNeHexUs Uc6wT/eso6lIq98YQoxF1trF44T9K4Mw6B20pt1Dn4EQCXOmyRJ9b1WlSaBDW28Z 57A2Dtg/NAqkH1xHLHrGVNSSk1SUCNbYr8h9sRCtje2o+6KGBVVI5MSKGB1t181B SyY4APxav29m1ybWmnfg0Yh9e7JaZqnKOwYpuQOpscUa1mWvVq7Che/0jz1W2FQS FPa025fX8xURe76jDM7UNmyq7uBbAbztiffeZNcJ90T9BL/e2SN1jSjH0Cbem1Vn A/yTvCHYMzYEXUshqjF1MHPV6bcQbGzYxgiEQizceVDuTFhFgd/XPKfdUJqAWjsJ pAiTBbCoR9MOTf62K5VH6Dln11lsc0rzIH4EMeIqSaCOUUUw+M2sJFuVkJVJNmQQ sEFvEiDCqcUtglHohrfMV/5OoNIyCbmWRxj74/hxzesKki/szt2cd8xf97/JPSQj Lh4TKmSfosbuG871OU/eB6QFm/Nswe8W959ydQFvaMGRVv80BBl70uW1ehWtlNfA Neq6eKGz+7mmEpMLoIkN0Agn6ie6DrC/wmapwQX6Oxa92OiAiHGdnQdjNIpPEOJ0 EH86CA76ODW1ETT8OUC2keVaQv/CZEzFa6/dw5Ut9qhtw2l+OKI= =LW5o -END PGP SIGNATURE-
[SECURITY] [DLA 2387-2] firefox-esr regression update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2387-2debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort September 29, 2020https://wiki.debian.org/LTS - - Package: firefox-esr Version: 78.3.0esr-1~deb9u2 This update fixes a problem that caused Firefox to fail to build on the arm64 and armhf architectures. For Debian 9 stretch, this problem has been fixed in version 78.3.0esr-1~deb9u2. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl9zswgACgkQnUbEiOQ2 gwJKPhAAukaOqLs+ceq8k6ZTGtQvdlGOPgcith9pRtK+sbaP8V/nqGL0J+0cpUxp c+y9u4vNI3W8Re1SlRI1qV06bIclRmnV2e6C7SpXbEeYeb2URlV063OOVuWSvwYo 35Wk/ZGCoZjl+qsfC0xmihPBMkhrupyuV7Sx4Mo4y3TQZ16VtWcUUCsqaCT4gXuE mkA1J+YujQCr9RmrInKYJV9ibrmRiU9rL+J71hilsKtSjcu5TBHogDDexpxh62je kA1G4Q2tzZ/DCHpqEZPWGk/QU05Lz+DCGxTOY9yTP+Mq5cgz1mdDiGGqw12IZTbl hZA7WJHxnox4sd4+ghnNFvcydpC92/VKFisbM6JClUSEZKhmJoxyFCC4duAfM3zN YjbiXPt0OVkbSbc3ZDokvex4rA+W9rESxA42GDrlGQW4pDifMYvGaDl0XrhoYKrf zDl24ilrG8BPpSPFiqm7p9sbqr5MlMTUL2St8AxE2z5F4byWcTZS6Mp8pxMrnDyt QiBNNQv/Ype/E/Mjf5mhX6Ti/m1+o1FtT1pFlNOqKV2ruOyCp8bzjWZSJhjRPZgI qi0kBUawKqXawu1bYVy8Ix8J3V/t4g9T5M0qpE7Urvz1Xwi5iDk0eR/LaS3NUvmG LORhlw/7Lje72gdxyP7ET1WyIm4UKmCUbrlsG/tAKWlFzDpj0Gs= =yzwQ -END PGP SIGNATURE-
[SECURITY] [DLA 2387-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2387-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort September 28, 2020https://wiki.debian.org/LTS - - Package: firefox-esr Version: 78.3.0esr-1~deb9u1 CVE ID : CVE-2020-15673 CVE-2020-15676 CVE-2020-15677 CVE-2020-15678 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting or spoofing the origin of a download. Debian follows the extended support releases (ESR) of Firefox. Support for the 68.x series has ended, so starting with this update we're now following the 78.x releases. Between 68.x and 78.x, Firefox has seen a number of feature updates. For more information please refer to https://www.mozilla.org/en-US/firefox/78.0esr/releasenotes/ For Debian 9 stretch, these problems have been fixed in version 78.3.0esr-1~deb9u1. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl9yVtsACgkQnUbEiOQ2 gwKxGg/+I8hfNnibCT5HYz5NdRkr6JasnPBoBizSr3lfx3lfIWTx6W0TuTaqGo9b j+kdKfRZ9dWDZggVBbwIt6JgozNkqT6qYt7ktTIZkZvM5rxyJIXtw29+OZDHZ3Qa SyED63X6p8yrJZVw6vLnwszY5YO7jWYzJ67gmbv939mxGUYaFa6Qgf9saKZhCJ1W GUqzqXoWbMutAqfwTakk3MeZ97OAlu2R/RYF1C66YzsvUew8q8dNcLVf5K4grD23 9QAmgmnx8VUKI9oZPweEYHk6ApWClU2pb/WDtgIgP+5KXRxvvb4bvNC8LkRw0opb 0dq5mxDIeCv41lmxdtoSVjMZ0ig7D2FvXUzvsOWC9Oa4rBlRScjjvoMl9tsWu6dh 6z/3t/kr9Y+uhrBlbBSQrXJUV73RxcC48BVMhTKYQcm/ErM3YaFg7KNDTL1Mqndt VjRNupvjMB+495+/laJF0jUwmNuwYYhEsPVPmE/Qs6TQwRULFG21pPGiZi+GXWUd hHmjPIdFPHBLwZv1FmHeZoqT4uEKpXf1OWN1ECvUwWRK7LVwjq2DyemCc0bgiQ5W 4ilLQkNwLcLZPz5KhHGauiF+7HBDpqChimd70pdMEkl6kHy4Ufdr36dRWNfdXm6P KvwMjK9WBFvX1ClwT4oBNjzAQ2DJFpt/FJATjkICgxxusURaTQQ= =fBp+ -END PGP SIGNATURE-
[SECURITY] [DLA 2361-1] libx11 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2361-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort September 01, 2020https://wiki.debian.org/LTS - - Package: libx11 Version: 2:1.6.4-3+deb9u3 CVE ID : CVE-2020-14363 Debian Bug : 969008 Jayden Rivers found an integer overflow in the init_om function of libX11, the X11 client-side library, which could lead to a double free. For Debian 9 stretch, this problem has been fixed in version 2:1.6.4-3+deb9u3. We recommend that you upgrade your libx11 packages. For the detailed security status of libx11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libx11 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl9N/m0ACgkQnUbEiOQ2 gwLLZRAA0IibAKeJzS3X7lqjPm4JEZknbGvzUD+lZz74jCBCqkkEFb23A4Ti3h/H aAFhzxF7doYZyVGFXZNxdMigD/vCzRqG9pxye7nZ1e46qKBdE2aHkhtJC39hPbeR yRkz6qDD5aexCDKPXW/ohVaUWy9x4Nw0SdrSk1KuHoDJ5AiQ5HnsarZA6Y1laFQW UtOUq3fW8zE20qWdm5EiNGiNVrCQwWB7NqqPkV/7/rV2lnTiz5pzbpNzxEVb1fkU hsxdEimquZ+Nf/ikKuCpwvo43h9vgo7MiAIjAYVXQVgKqarnX9Q0Ovb3OYshiYjh 4TAtzvgK0IXqEAAdH7LbUt0MPO17sFRyrY1TRU4hdczJ57imZ7TGCJ0pmsPYpQiy NapupdQwp56GPdrlKKjixqaFn8XFFVij6oBlYztuVKPFWDAjpSa0gCP0+RSgPp9s IkldaC+NhrCHigfhN+FnE8mRxSd+j3AZo3oZ2r7L8mopwjxd3mx9Kt0CMcD+/oC0 0AtmInQgD6DXIHt9nHIlpKlPd1f6qLIR35eE0JpT69wycRGZWOFTJLLUWTXLx8af +8MJBEUjb/Wpaa0oR5lzRe/pZVN3R7NrPnQtPzYHRD5RsikvEHOvffHTBgILcesv 9jnf2X4RE1mqkqgpL4d4bwOBen67GH9cjURv4OPjTB1v+EuHLLE= =FV2s -END PGP SIGNATURE-
[SECURITY] [DLA 2346-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2346-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 27, 2020 https://wiki.debian.org/LTS - - Package: firefox-esr Version: 68.12.0esr-1~deb9u1 CVE ID : CVE-2020-15664 CVE-2020-15669 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or unintended or malicious extensions being installed. For Debian 9 stretch, these problems have been fixed in version 68.12.0esr-1~deb9u1. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl9HjToACgkQnUbEiOQ2 gwKy1g//epY8CxqTiOyX0tSh2oW2HcbemrHCQ1AcnQfaCw7J7E9gcmIou5u2WBWy ndAz1EbhWE08iFV+IaIzccqA+2kbLNP0IOzFBS4atVTY27ngiR0wXFJK7Hg0uxsf yDGksv0lnjA79Jk9A5TSJt8uvaDFReQv9W2r57V9fDGky1CGTbIonXXGaMdsieDY fOHgqkFOXd4TWlnqGai4zSyxaLO5yqsmllLUzH2PuaFs5pwvKgRkz95cu5DmUUuU faVEO/jyGDpkkVViHCE+baSHoG79xHNGG+Bral/aMdB6O9k25WzOJKW/Dx0tzbMO K0OSSxNHKSnMKoxrtSn4oH9XH0Pq+NiiX7W4ycDhzX5fWXswm9nyGj1SDH5y2IO/ IRH36ycaXq09+7trw1a+XAB2duQ50PBFqlE01h/xOZ9qzmjmliCU05vgVbRraikH cbHj6pRFTnN76UYaWyfaYhkNwu9mHVa5SVPPo0y4LxgtIWDLYfX/u+y08Cth8OM3 JzyTsQKZhPCuLK5zbmPhkTtpeVBbSUICKmhfLQzQKVY15VfeYX+cnS5n/djVidsr BjaOck/WKCz8/wIwG28Qy/MiWI9gmAVPDPcIV1FkW6xgU1Rgw9DHkIrwMe8EOpFT DiIXoDZ6Oem8MFqKM2LAGnUg5f0Gjz933wevtNh5oUTOUTtoK2c= =Ybf8 -END PGP SIGNATURE-
[SECURITY] [DLA 2325-1] openjdk-8 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2325-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 13, 2020 https://wiki.debian.org/LTS - - Package: openjdk-8 Version: 8u265-b01-0+deb9u1 CVE ID : CVE-2020-14556 CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581 CVE-2020-14583 CVE-2020-14593 CVE-2020-14621 Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, bypass of access/sandbox restrictions or information disclosure. For Debian 9 stretch, these problems have been fixed in version 8u265-b01-0+deb9u1. We recommend that you upgrade your openjdk-8 packages. For the detailed security status of openjdk-8 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openjdk-8 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl81ENkACgkQnUbEiOQ2 gwKJNA//aVudX1UHvAYLHly3JxFZanCKBPIxnwo/nVcGvkEsNag7WbDfcEYW/RWA M9Lda3EqfRtgguPHB/AOpGgUj/0gayT4wJb275OTOeuaNd7KdlD8Kk8EMf7E3IGW pRxR2N/mEGhjb7DVXZy/SNWj4co6Yk6Nwh6ikEgR1kXDwlJMXStowKNApyNra+30 rosflBtlkE56uOJQI3GT/B0dF5GuJM5vOzXXM2Lcgo4EKci+vmWq7uzCfDKY2MzO f2Oocfi5CCwS/6S10XkDGG5xvuP3tXKMs7ggfv8ooNDeaGSWnXJIzBFEHg1ILF3j n7KhGIPMysyGbGNU0DgOxCOrsUP8ivhdA36fVWRV7JCFxlHjkM1BYY4z0s5dub3e Q9dR0uPeHfiDUie6LN3FVoiM0ugn32WwtCACG1JvNifLF1vdzgSmvpvKpk1paF+r XBxw9K6p1tggvTMfFGThI/d8Cpmcao38egybPyYdWGzsvMpVu1EgAk4aUDdlHGVh A+C6sH9cUNSAJWcyfa5IGvLiFmjGhl/WDABm0HC7DJ2N5Rp5OsvEpbDJixV4kaa0 A/D8XRRR1UEFeGCWEDmIXaCadaM0qa5yiNNAb1pg5fA+N/lXiM0egmVrrVBskjko 8IGmrdGJCPNgatwL4N/M3E4ZLkqgTyQVIRuX7TYVUDLvfnVynto= =E49I -END PGP SIGNATURE-
[SECURITY] [DLA 2315-1] gupnp security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2315-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 06, 2020 https://wiki.debian.org/LTS - - Package: gupnp Version: 1.0.1-1+deb9u1 CVE ID : CVE-2020-12695 Yunus Çadırcı found an issue in the SUBSCRIBE method of UPnP, a network protocol for devices to automatically discover and communicate with each other. Insuficient checks on this method allowed attackers to use vulnerable UPnP services for DoS attacks or possibly to bypass firewalls. For Debian 9 stretch, this problem has been fixed in version 1.0.1-1+deb9u1. We recommend that you upgrade your gupnp packages. For the detailed security status of gupnp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gupnp Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8sPZEACgkQnUbEiOQ2 gwKOdg//SAzCDZdsvzOl0j8Eij4cHjvDCngX4eFIUvjPCgfOhleul7J5FLq8oLpm bLfUzlFSWI/lGnBc7SOYZpIfQGFS6BfhORCpqi87JbJlTW7P3yDTjaO3TPATiNm2 tT0FeIC2D1s+xzrS+eEK9PoMMUf8m+w4C1XFewXxioeFje34Yuws7GweuvR77tJ5 iGXG5dqqFBmGk/bKNVe+iIK76nWuw5cjgXBPuDLHLIm8YuJVxh7KFDFPoWW479aN PuwpxJOk9rsgMhzxLdz/wHCxQ/Ir9+w2peocQlu/OBsgKDrzIFbpapQhqPONhloj nnIyC2S3e8RUIWZI9zSN8CJQ3bbAN79wQyiLkTFO+9GzKN8zOI2xmV24vGnaBGUh 35T4UJ9A1Wl5oqevCSvMxm9nOmpvOORw553GM+/V/oxLsHeedKIOtrwoFQZqbOmn HB5zvkrq6c4Gbm6cbo1dohSGk9mXrkrs6mUpdSmd+5xKd+SD83AmaYw76Q6Refuq cw4gWRrl7xg6S0JmX8/oV5pp4QATRWaPHjYCq5qDVX0ugIGJzvqr7pQ3iQ1ok1Rd KEH/Ws10istgdPrEhJWZKbRyx4lXz5o+zqomQSS4IqjvRtYCDdZjoQaRW3ACTJgH /drz32GMu6RuFpW1sjVHS3xY2W1mdhNj9FUrFRKTu+7qf5nwa7Y= =AoLt -END PGP SIGNATURE-
[SECURITY] [DLA 2314-1] clamav security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2314-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 06, 2020 https://wiki.debian.org/LTS - - Package: clamav Version: 0.102.4+dfsg-0+deb9u1 CVE ID : CVE-2020-3327 CVE-2020-3350 CVE-2020-3481 Several vulnerabilities have been found in the ClamAV antivirus toolkit: CVE-2020-3327 An out of bounds read in the ARJ archive-parsing module could cause denial of service. The fix in 0.102.3 was incomplete. CVE-2020-3350 A malicious user could trick clamscan, clamdscan or clamonacc into moving or removing a different file than intended when those are used with one of the --move or --remove options. This could be used to get rid of special system files. CVE-2020-3481 The EGG archive module was vulnerable to denial of service via NULL pointer dereference due to improper error handling. The official signature database avoided this problem because the signatures there avoided the use of the EGG archive parser. For Debian 9 stretch, these problems have been fixed in version 0.102.4+dfsg-0+deb9u1. We recommend that you upgrade your clamav packages. For the detailed security status of clamav please refer to its security tracker page at: https://security-tracker.debian.org/tracker/clamav Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8rm+QACgkQnUbEiOQ2 gwK3gxAAjL9BRxGbMytuXA1FRpIHf+bRx1s9BIX8mdc/CrdolZ1fw+GdGJ+gwYfT bXdmQdvhaY0e0pwEyZiHp0VSO0fdU2YgbU2Zv0PWDyDQybFX7V+Wi7x8oAdD451Q 8i30HWuWUKCewwDkxPMf0GjNvQjDWNg7T0wXfwYxTRGwSDoOkMe+89WX5jbXqbz/ oroFY65PHogLzOWO6QZQtnJKO1M+9zhZKnec4WQVuCMPj2Bu5BU1XOoZJWLSd2i7 5lRMpHJER5KKdqcsoClhviCazHBF/t5zzRKTz4UgF0Di3BZl0dN23VY3BD+gQ4Ln g7CkPoWvGHHtbwAn39I82KeoqNki5PQ911u8WMF/4VxiqLiZgFOMUCyhVXYMRsRi n5LRVWnUsAJ5/nu51UIKW02jocUd/lEUniEd//+zFYoYKZP4syHwdQyBMsOQkhpm KL6PHmyKQHHm380d0BqCR887NvdHXJyiVTA/nLc2ywbuHGCus5OJ9C04LPNl5g9O imQVxN/zjRB/2IrzMmLoGHLi692eXutZQvsp+nDaAceLXoT5NewDNZG35eHDYHyk IFtklF1S7bjbh59NfWtb46+P+tVk16b3Vf/VXzKc1cwq4l/609MtJwEcPD7mfBph s+e1udE/kx6EnrzlSqISlsQON+ZbEOivXl8MUHdd+THw/NszeWw= =BcAc -END PGP SIGNATURE-
[SECURITY] [DLA 2312-1] libx11 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2312-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 04, 2020 https://wiki.debian.org/LTS - - Package: libx11 Version: 2:1.6.4-3+deb9u2 CVE ID : CVE-2020-14344 Todd Carson discovered some integer overflows in libX11, which could lead to heap corruption when processing crafted messages from an input method. For Debian 9 stretch, this problem has been fixed in version 2:1.6.4-3+deb9u2. We recommend that you upgrade your libx11 packages. For the detailed security status of libx11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libx11 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8pE0cACgkQnUbEiOQ2 gwL+yxAAwbCYdXcrFKpXF3OU5pNaXaWEyVPRenKg8U9607pBp3fwx7XnPVffyZwy PobB9BZgEi16XaUTxx4lUUuJuZmw8VLJwSZ74ebVqiNnDE/svnPc5JHT+h0Ejtra lUPJN0xHtMuXVS75EobLTZiimBeE7PrEpYwKXFotgGVjhcpaScI8clK85lBkQUQ3 /bArhAnJ4bmbcTavjUz2mK6b+rHMjilzaBbuR0puQ3fx/9jnnJyQTirQavIWVDAK CJFEvFA55PGmEZNun87Z1uQf7ptfK0eA9Jf83pk3DszSaoyrdsjuKF8AiZIBcVMf Rp2aDqmPuLZN7bxlh8gDDDpm6oXO5F+UUj3shunJKjMma3mmHmR3b5MfXDAsba/J AkPzSC1syxGA/8jQ+eVEsVqaZ1LnREwxLICzF/AfEIwZVP5Sg/D6C5yv9PTcHjbg 5NI16qzTWBJniBh3qmP9tpOFEBDlRAjW7CrXvFIuWFX2D3V71zCximdmmvNoIbIn ZASGzx4aWJXd779pAnc/2pv/NdrRiiDJojXAPrqjmztHsDt73ww8TbNgWMw0Dc7B lSgTNzcfCVE6Wie1oh0BpK3q4KRy2KzeQjmHfRLt5SjF0ONwaZgPSwxl85DKclUl X1D/ED4wxt/XS5foVIddO7w6GnqJBqOc46Qvkx3/SFZrMk9QBk4= =Y2ZK -END PGP SIGNATURE-
[SECURITY] [DLA 2310-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2310-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 02, 2020 https://wiki.debian.org/LTS - - Package: thunderbird Version: 1:68.11.0-1~deb9u1 CVE ID : CVE-2020-6463 CVE-2020-6514 CVE-2020-15652 CVE-2020-15659 Multiple security issues have been found in Thunderbird which could result in denial of service or potentially the execution of arbitrary code. For Debian 9 stretch, these problems have been fixed in version 1:68.11.0-1~deb9u1. We recommend that you upgrade your thunderbird packages. For the detailed security status of thunderbird please refer to its security tracker page at: https://security-tracker.debian.org/tracker/thunderbird Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8nN5cACgkQnUbEiOQ2 gwLUphAAqSzH6KPTGjU0eF4KXjx8Umk520Yxl/ZqWM7GxSCyYyr9qXNDcWf3X+W4 fFGMgEhOYIoh7oIB9o6+Yuiy7nVLagbAb5YbfKUM6NGufk/0U/CZkXognpk6VEUM DVsYQfmD3rhJOc117th0EuGVqJ16VD6Un+HzkW9bhnJDqXxl/MR+8UrRwXUnAUVp 0AgrBU3XqMowr5UQW3CvP/S96IspkhkWj8z6dy0WJZw5arD2hKi9hxH+VXUV71lO 5RbDUu1Ns1Jm3x0P004h4eGGtdLxJEjUKNjFdacNuIfx80EmEpKThrjRVsK7Ct7H KehMQ6mBZIveLfetMHGUc+yyCpcC+KkTmJsMh+p8vyz+cskCELtGEvbgyxwZEJnn uhJrYV4upLDesGKeRcsSIuE+cMQUNEZ7TZlkJN5AyFl/ZWdfVee86XrrM94CFLii V8kVAfpWRn2jAQ8ZCBUgkwGPXNhq0Zmksq9UzljoS2ogXxBNA6EfB/YLPRGx+5if Xz8vtZsIRd1kU/qte6vjBOJaMT8CdokMtkJi1z4lZRM7XoaENh0n8QWl+Wge57xE 9Xkp9OaXCpLDzxTuFf/BDPYMQubUj0mc/3nwEhxjgqjg594mG0Y+QFFktAEEduY7 chlHMDNsnDKxOeKxBdvSb34YYMdGM1P0NlJjPHlBTaeANJPqmoA= =Zltv -END PGP SIGNATURE-
[SECURITY] [DLA 2301-1] json-c security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2301-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort July 30, 2020 https://wiki.debian.org/LTS - - Package: json-c Version: 0.12.1-1.1+deb9u1 CVE ID : CVE-2020-12762 Debian Bug : 960326 Tobias Stoeckmann found an integer overflow issue in JSON-C, a C library to manipulate JSON objects, when reading maliciously crafted large files. The issue could be exploited to cause denial of service or possibly execute arbitrary code. For Debian 9 stretch, this problem has been fixed in version 0.12.1-1.1+deb9u1. We recommend that you upgrade your json-c packages. For the detailed security status of json-c please refer to its security tracker page at: https://security-tracker.debian.org/tracker/json-c Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8i3I8ACgkQnUbEiOQ2 gwLSwA//ZufnfOdAgWMeOfzeVFFTBXW5YSkNUJobcZ7NHbrwxpYSooiTobU1YQs5 DpDeWP2Vfa3VvG13yjgqysO0U9ijoNiGIhF8jHEAnkEmFi1cQ/Z3MRo5fTXSXU1m yeJ1aKAvqaImBhnVlIKKfCGb0DVC21EkihI8JDjepLLli9/ewtzFjuKxPVK8Z1a+ 12Sl2/HcHAEnmd/Yq6t2zGPqp2RLzs5YzYSDiQDnmcLlp7ibaftwCwckFo1Yo95R mHvBzqsIrME5kIUDYRVK7Br1uAXojkOeSuQLcw1KRfc7khiMXGhkRsCMWBPegS4L cYGP/XiHvsCRfLkvzsAu69CiSd9h5a/lPwQKcCzR3sdcSkRjsLtoGtQJYFIYLvBn G9QCz2V/p19EX1xY39YWuLNugTuV3KHB6soYUIGJkSaRJBNCzWhFGQHJHHVYwmo5 M0lrPBQFMPrbP9agNbZJffVeSFcnV5k9vCDZ9hVKE9ByBERZckjXONCT6fV+JqWq di0K4USvRsXLxW6PWhgoK18GUN+1RqoiLD1r2GCMiPwRVx+v9xqpisvtTFQhVhLS d79LALJktJeq4/4NPB91bJ7OcyXBF6WtvUEMszgLYhLqEGKpYOiVeBy68DB/tvEF ZrqyPCh3eVFGYHZBsww3r0fnoYsnrscOeIowjt09IY0Lylqw1ik= =who8 -END PGP SIGNATURE-
[SECURITY] [DLA 2297-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2297-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort July 29, 2020 https://wiki.debian.org/LTS - - Package: firefox-esr Version: 68.11.0esr-1~deb9u1 CVE ID : CVE-2020-6463 CVE-2020-6514 CVE-2020-15652 CVE-2020-15659 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 9 stretch, these problems have been fixed in version 68.11.0esr-1~deb9u1. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8hR7oACgkQnUbEiOQ2 gwK7Yw/9G42KBIoC3fDoFtIrnfJgYljW92BmqQ1ru/odMGbXFUoNrpPSTznhFIJG VxRS/a+JgwI9tw2CZHfXodiSFx4F9riwU5M6ErJ7Ze4Iky5CsK6sXG5exuJPmypf anlEeMsnch5P0zZIgcyusYBg8x9P37IpI6TAYh51Qb/NF/kJz1Hifd790Frg22tM 30CyZ8i9lDTAUeO/fZsSScmD9mndfCd4pkTuWujlyAYTj2pOVIiPQf+w0dMHzm7m T8KvEX/dVVRUkD30Mc6G0/ZIAZmBzuUd38f1v5XGLjLFx6d/heDIxPAzY1R5SfJ/ Jxk58XLNTPiM1z/GXULv1Dpqr5p7dDLoZhtbP3dbWllbGZTEKDc/g2+YXpIeb8W0 40vEjt58biCv7cylt+FeYPMapYSrfR8TkZzd/Nrhy8/llFSbt5SyudU+LgC42iKt qapKs2PHxOuk/FyRvr88xlAM8TlH9YhJidxGQpJ+y+wjj02b5Nc3f08S7/CBE6mr ws1RGbkSFB/6PSXjJgroDGGnjrBV/YSJe8/bIF48kNwA41PQDw+CQBhRCVwI60mf aqs1P/cio/o1s5Oe/DkyYzSXh9/60pRnG1VGotHvLjHntCAFDXvEUcXYgegVoCCD iMUDS+dcS0bdfp6+BRZLDwJFxcJfRYVD5JUJdaLovvpkZAJm2Zc= =xBzb -END PGP SIGNATURE-
[SECURITY] [DLA 2287-1] poppler security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2287-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort July 23, 2020 https://wiki.debian.org/LTS - - Package: poppler Version: 0.48.0-2+deb9u3 CVE ID : CVE-2017-18267 CVE-2018-16646 CVE-2018-20481 CVE-2018-21009 CVE-2019-9200 CVE-2019-9631 CVE-2019-10872 CVE-2019-12293 Debian Bug : 898357 909802 917325 923414 926530 926673 929423 Several issues were found in Poppler, a PDF rendering library, that could lead to denial of service or possibly other unspecified impact when processing maliciously crafted documents. For Debian 9 stretch, these problems have been fixed in version 0.48.0-2+deb9u3. We recommend that you upgrade your poppler packages. For the detailed security status of poppler please refer to its security tracker page at: https://security-tracker.debian.org/tracker/poppler Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8ZY2YACgkQnUbEiOQ2 gwKrbA/9EzPmSehi0LhWL+vq6A7eAPXPRkuAtwQ9elTLOo1jqm2v7XbCbhEdbskC /BNOQo7H55Svfrv3PQ5xDUJu2sHu94yjswVEnQOAeX1QGzj+VlVfC4sMlooxeUyI h4ZkZM8wYx5MCHVOpRmp7+mb5yK0nCixdKYGenQAP0eL4sunBmErX8ZJM38VAFTE l4Mvl8sJhd2a5KDz/5x7BSZAwWLq8RDaIP7uvPS3/nMWr0yDfPXUq4SCBysrb05H MV1TcpUaS+FLgfF8HyREHl+cKUqQoJ3guOOp+GZjrNk5QHsNu6u4eVtfoXmSUhyL MsB6txNDs5iqgeKKFlKWV5UcJRN60NR8+jH/kSn0KI1qEL0cEWAj91Ad4wI3Fy8x KFZvlN1u9cv4oCByEb2WbnPQu9/qKs8nUMFgxB5LwDGrMuEG3w26R0u00fT5v3mF 4L4NU23Kwjbh/+QAiT+MoPx03bYlaDjQs9bAjoWjFiFs3zhUueF6s+YHG9whC8VV diyChBu5q1bZWRTn4V97x4ZdUaMtjGBNZPBzjHBHhU9mbnNjt8JZM0OGS3kStFTh ZlRaiCehnYIh9+FXmbB8VvvP22MNgfBhwKvExWDVfkA68iSrp41Z822D8IubdAb0 md0jzuWUaORITRTlVxyeeuyQtYceyRwkzA6CjRKBCEqPQqhYP2M= =t7Bm -END PGP SIGNATURE-
[SECURITY] [DLA 2285-1] librsvg security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2285-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort July 22, 2020 https://wiki.debian.org/LTS - - Package: librsvg Version: 2.40.21-0+deb9u1 CVE ID : CVE-2017-11464 CVE-2019-20446 Several vulnerabilities have been found in librsvg, an SVG rendering library. This update corrects some denial of service issues via exponential element processing, stack exhaustion or application crash when processing specially crafted files, as well as some memory safety issues. For Debian 9 stretch, these problems have been fixed in version 2.40.21-0+deb9u1. We recommend that you upgrade your librsvg packages. For the detailed security status of librsvg please refer to its security tracker page at: https://security-tracker.debian.org/tracker/librsvg Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8YHZUACgkQnUbEiOQ2 gwKsAw//Vu8qsJMvRju0JqflD+BJTRZQlhx8+e3ovgNREDoHcHI2VMMIdXGAbaof I63IPQc2UhMfAmOvJQX5dlqBAx1/iNKOzbB1KXDnxFVs2hwo9FI/ROk4s5O+t+Ix Nu2AQyyWOgmL9k9QNeJmVxoI0lgXUWE+iADXCyavxefRaE0beT4eyrseKudHxwbW DuX80YYnHfL1B+eIa+AslGeLWeB3chY66u9HE1uYS7ul3YxS47arRmyD83lH5a33 x4w5UERXeQYknPVCPd8h7L649jVo4ynkokfcTeWEHL7AHdh2aru9NaNzl1nwlvMZ HwYvE9Rt6Bmp1lglLe5cltaiQm8LY1HiaE9yHhvtC4/evlzle9YWAZqCYCqWgxj9 y9qPNn5TwCXTotJyyoZrvFRtHpm1yblMM3ScL1x+nMVdB9DkYvM4zjpNjJ5KJg5c tn+sh+VDhTYWCdwsPlJsOUzeXdOPaH2ald1046f9PYm/WSGKcCY/Qj+/DH5sjph7 BHRl7qOHP4kXAHXx7TT1lcUZH6fnEiQtQPNey6BmMI5+k+S8OJAOygJPBW2aMD1c uNvP8B4Y4muSjDfhaVH1WN1tvSSrlaHTggDfUw57QkGWE3WPDgT+ovQIpwThnAaf AURr8VfZwTZ+EwXz3kNRlIDdCzQwMpawwLaenqDJG/ZfKzvKa7k= =7p8K -END PGP SIGNATURE-
[SECURITY] [DLA 2281-1] evolution-data-server security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-2281-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort July 16, 2020 https://wiki.debian.org/LTS - - Package: evolution-data-server Version: 3.22.7-1+deb9u1 CVE ID : CVE-2020-14928 Damian Poddebniak and Fabian Ising discovered a response injection vulnerability in Evolution data server, which could enable MITM attacks. For Debian 9 stretch, this problem has been fixed in version 3.22.7-1+deb9u1. We recommend that you upgrade your evolution-data-server packages. For the detailed security status of evolution-data-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/evolution-data-server Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8QGqgACgkQnUbEiOQ2 gwJoWA//bs5I4zDbO5IsBH2kCLnwLAQsLg/4pIEnDmHsHEP8VbKsh29UBm17VaN+ 7k/OzY65+zW+V0mO7FNEq4leYKHAKDK/V+9R9RZAK6Dh5DfuVVhbcue8TLCAqu5F opsbM0wmeMbzc2NvR8bcU9Fo2Jl+KEXxXi05nBeu38tXOgyA06CuDoar/bEfi4NE gCTPUcdn82YMDcgunJ36Tg0uJ8/jsCuvd3rqxTd9ZoV3PisiJomqfIgZEEMzGeVK 79UcdbQBHfaycksh1SKabyDPU0YlR7Wtn2jsmzBjX2J24APdoyrdURikJHiu2f3s 5pTiMJ5vJK5UQSNT1WWwfI8OTYbdTFjPOUlziRoRALUsq2IarenkyWJnoxnIpfYv xBFZklhtIvHOz97W9YCqCLM+Gebyr2UkFcDdEMBQEZMRHQESkj58UhW/GuekqCTi J8VIH2xad6TeVWsDk/Y8cge+JooHL5MrUpR/tBNAhAFWVWK8qe+gC2g3/S5SlPSz XDB6x3QhMJ1Chjpk+PBHOBkNKBZ+HAVfWb5P735c57gpTteUU1ikamBaWHNma9Sq TYTKCWoM9OtLneUZZzPf1IL5N+xT4dAwzRkDBfatVZG0QAlSMwG/0mbBiZO6yz+p iYhTI8jkSfqDQi0jiwO//1A8tGRf1jXj/F6jNtDgFpk4oHbaAmI= =qyrw -END PGP SIGNATURE-
[SECURITY] [DLA 2272-1] Debian 8 Long Term Support reaching end-of-life
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 The Debian Long Term Support (LTS) Team hereby announces that Debian 8 jessie support has reached its end-of-life on June 30, 2020, five years after its initial release on April 26, 2015. Debian will not provide further security updates for Debian 8. A subset of jessie packages will be supported by external parties. Detailed information can be found at [Extended LTS]. The LTS Team will prepare the transition to Debian 9 stretch, which is the current oldstable release. The LTS team has taken over support from the Security Team on July 6, 2020 while the final point update for stretch will be released on July 18, 2020. Debian 9 will also receive Long Term Support for five years after its initial release with support ending on June 30, 2022. The supported architectures remain amd64, i386, armel and armhf. In addition we are pleased to announce, for the first time support will be extended to include the arm64 architecture. For further information about using stretch LTS and upgrading from jessie LTS, please refer to [LTS/Using]. Debian and its LTS Team would like to thank all contributing users, developers and sponsors who are making it possible to extend the life of previous stable releases, and who have made this LTS a success. If you rely on Debian LTS, please consider [joining the team], providing patches, testing or [funding the efforts]. More information about Debian Long Term Support can be found at https://wiki.debian.org/LTS/. [Extended LTS] https://wiki.debian.org/LTS/Extended [LTS/Using] https://wiki.debian.org/LTS/Using [joining the team] https://wiki.debian.org/LTS/Development [funding the efforts] https://wiki.debian.org/LTS/Funding -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8ENPAACgkQnUbEiOQ2 gwJ/Xw//btcFfkBU/wCuRABz3COAeuz06OOqcocT3E7Fef0EjRCZmIJxee/M24HT FJ7i93gdKf9HhezklLT23Yei1YzGedWRm5uHZv/33ZU8X6KEab+5qGY4in0sllzc TwONsgn/WamBPU0AZvqD45gKZRAbhfZSZQ3dFi6bJcT3mf67m7w4vfmsFPEpsC7v kI2nEkE6vx2gy+JX87fHu/qqzFg49KWOEZEl7ZniUiBUUYqX0H1v6dMvQ4dzE90I dqNEMD7s0Y8sREC8QZz7FEbsqyfPKYe7+IAWKbIrG2sj06BFnCczGWSBQHHti1k2 JHcGiPBio4PuMA/1EASQ7zP+Hz7GDguOhoEiRxfZbDww9yJjTi6lRci0PM5GBaPl 92SlJKyc7mTOtkY9DU6dw8s6cVT6NoVFxIxRpallVpuSahAOQ/WlhvcKsYEPUeF+ VqRW/Po2VGJ4MrKTUrkWtxRafBUGTwUhDXkij6rBlPY7so4ox7i4hjvnHWexCHUT qwPNNe1FrLNIBzh10g8ECLrJOONLoqT14GXI9sDVcqygKVi/hXlS5hDzAV5VUPbT XfKy1qR3gKkDjr95qJYiJ+6vZJcFn6VojCNBA2mle8LmgX2V0tIZ1+3yu5B+l5Of /AIhSRotRXZ2V3LnUQ0WqtAhXfi0bZVIwip9/SfdlcWGOtSkVnU= =sIJF -END PGP SIGNATURE-
[SECURITY] [DLA 2172-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:68.7.0-1~deb8u1 CVE ID : CVE-2020-6819 CVE-2020-6820 CVE-2020-6821 CVE-2020-6822 CVE-2020-6825 Multiple security issues have been found in Thunderbird which could result in denial of service or potentially the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 1:68.7.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl6VkBYACgkQnUbEiOQ2 gwKEYA/9FtnpASX6c2PexeACS1xphJDcjkJldbsA43ga9B1J0jk2ks2mQp9nCvGc rx3TQYSprC76FMYQz74ga2WtKIkAWR7kXen6nkoWWcYUiBoHE9R7R+FCGeepRbiH 0PzKoSvFHHBBuXSNPLVjFko7A6aAroZdyIoQ5Hkp+nbB9XcSvPOVImVjs5HBz7dH XY7mx0c3Ls3t2Yl3U02js3vh0R3gF7ffAa5gSphACQ2SEWiYQpcUzdcPymPflqH4 j5tGo7MBC5c2A0/E5YrQBLGrMHk4QtLFjF04L7MrfTkpBFq2/d86tIW80X3jlW1M 5Ef/gl6EI57uVCjgemNtXT6STJITkfBowsGy3BttVp1a8Rk1+eT1zlva4lVUT+et YCx33uS186Z5TlE5KZnWly6znfxDsCDdqTkUK+ns/+lyuD7fOjJNnC9NZja4d7V8 LsKehAYg8UtaX07p3ybAbrl75QIQGdUawkZWz/A13HN/OmFrYCdkt62kfRowp1ju Hjkhp4Nc2OR/fNCJuuNyFmHIitpxu/SeW6Hj89GQAtvKFA+RYMwAULT1SeXbY1kJ Uztu9sbC/IwkwdRCfwRMbfkLfwBhlXhJgdOfirqCcW8h0knTu/zh/stuGJYXQeU6 MUbPCPqJogMDFtQdz0rNrStRv6oJ4H4+2gmY9l5XOTEJ7sKpd/Y= =qOqx -END PGP SIGNATURE-
[SECURITY] [DLA 2170-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 68.7.0esr-1~deb8u1 CVE ID : CVE-2020-6819 CVE-2020-6820 CVE-2020-6821 CVE-2020-6822 CVE-2020-6825 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 68.7.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl6NtzEACgkQnUbEiOQ2 gwLQkRAAwlHcZQ88skZKDrJXgOINXYuORnNV0ppBENn2GsaJAGyiElDL4wnDR7Vs Hpny/dw1COX09MjMI4xICFMmXaCHy1Incrm2koTloL9fTViiHRjtLKoT264DX66C e4jUJiG3E3pjaotOjzMzbJA1ARjhC67sv+z2fmRrxuyOeeB5hn8U13gn+HrMc8iL EbwPOEZFt2WeHqETfeT4ifoDLRGbwgO2IjeTjHiDGTjJYZiW1cv2uBjhODMU5T8w dQtlKvXdCdfmd1KthKJ53U0cRQ01TRWXx2c5EMnvr6VV0Zi7JZAh7z5zM5TxnYUU 8IJO9//CV0HVxKPO4Igl16DzQ+d9pHZGZRm+UD9dlZoyE6cWXIKBIKqMHRsAUXte U/M73xifKq1srFovUxhaH2PoUBm98sfyIBcTamOh2knCC/4Jb+XFm61jZkXEi2PF e5REGtK4SGgZ87dzijSMQOK4wrszw3ntWIXD/KeTAB5FoCZVll99xgTDlGWGN50b cOaSSIHXAhXJrWFwgSBnM04SXhu56KojROhPhXEiMVXj6xmlFRjVttdn5vXIUtfY YFkR8mG+708eXQQnaPpd7KEiDdaSq1rueFy+29DZXzRs5jaYYZbZn2VvDzAs/EJa VpywMDAY9ujpLQS3eurNLuFAqM0nrZS56NuzFz1F8A4UWDxNZEk= =gKkj -END PGP SIGNATURE-
[SECURITY] [DLA 2151-1] icu security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: icu Version: 52.1-8+deb8u8 CVE ID : CVE-2020-10531 Debian Bug : 953747 It was discovered that an integer overflow in the International Components for Unicode (ICU) library could result in denial of service and potentially the execution of arbitrary code. For Debian 8 "Jessie", this problem has been fixed in version 52.1-8+deb8u8. We recommend that you upgrade your icu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl50tAwACgkQnUbEiOQ2 gwJdVw//eCmu/7Q2++FSXVU/GdjkerANrnhuNH5sB7r3XWEbWmxuJkS29iXj2zvo F+DJPHUmnHyZtYIy+OpQ40B+j3UR47YSSkcIjQJ053yrKJz7jnVlgRmV8BfHb7Qc djsKNc1/f0/PX6EcNObNES6kZfvqMBa276z0t18FMoDfMtVICQ3caxLMVsZiz+ql AvYQ3HJAZ7PCN03jr6xc9vIKVyWnpOL/CVtYlswl15tXNkSTXLacVZq0sR+/LJzw /Iak76WGJg9hYzZnisHlvL1DTWFMqCBpFeA6FUzXGhODEeXzTlvXRiySbSBLq5uO W89TUcqAbCIo/FzP0g9WnvIZ8Spm2CYLrAtoV+eP/VdZBJvveUZTIqWx90T1E/EK Cj59XKVIR2jKPMAa0xSsNHwm4S1DMThTSJSCcJPfjWCYCPcv7Q57gRaD8bafvdDO O0jw76d6+YO9JgNOALnu8vPFv6YOSd9sQSdqzOhSM10MHAM/P0cSXStxmnyW17uw ADBE/ABI2tJNYIbnNdHgfin1uBcBZA5zrmbb5Al/Oy7XvS3U0kPbfnd+j2TGFnkC RrSVpdrZrw8Dt7NNXnMXc8MGe33V5+nQPcMVyQFvu6KIx2oeIPjfnC7hny0mtYB5 XFQVV7QcwS9+8HqGWgy5uvY/h0rSMs2p3f53fzkJ2RaYfey0NHA= =O+3/ -END PGP SIGNATURE-
[SECURITY] [DLA 2150-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:68.6.0-1~deb8u1 CVE ID : CVE-2019-20503 CVE-2020-6805 CVE-2020-6806 CVE-2020-6807. CVE-2020-6811 CVE-2020-6812 CVE-2020-6814 Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 1:68.6.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl50lCYACgkQnUbEiOQ2 gwIQDxAAvVjdfQAw8DFhw2Vk7aN1pEboKeZABg5BdwqrFPWZplLZl8pejNQXX7bB s4Scw0x3xOJagRpFZW8ajgVYD3JUzhtbILLJYQUf0GgK990fH+NbtfMoSKNe+lhn SmEUyApTjuGvoQ7CBdvWMtasEc73xNrlRmXH+7KrDsVVVkfxYbc9QAfWUyeu+fmJ WaWq9yixIOsP5JM4hmqta42ZX5tfbeYGYbL8O9uR+g5tqf7RGIbNPxQVknIJgynk hCEQ1JP74MTtsUTvW0OhODPWLAA7nS4K5Kk7ZY192kREFxDcwHtF80G/8p8qHWsO adwyDk9UMX/ATjwlxubulX0Eur4JurOIHfBVjBkylDXucSpiDz2N7eg8/wSUvuFU IvHodyi2BbHRgqkyge1xbiL+rdCbFQyAbn3gE5pjgYqk7LNmR8c1h03p+I0nXTUg AsHjpbf3+PorvkXDFAhuGyJBgq0FZP8uGgb5DX6eD23I39sPUXAggimcYqFSYvsz uR8MjyVFPyGpMXDzb2L6WxToE0HqQE/v++mmUhO96wOdzyniVh7wB56EFybozkhv uYLi73c4iMyT7jSKT9LE4IUyDPJdlrIY7JO0kgTOctwVQCyM2MFDwJ5lgO3gWX+m 2VSHNWGbm1gKJIQTFLIQkqdIuv0oZFAneEqLQZcA8f7/oDD5ulU= =d3Rx -END PGP SIGNATURE-
[SECURITY] [DLA 2144-1] qemu security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: qemu Version: 1:2.1+dfsg-12+deb8u14 CVE ID : CVE-2020-1711 CVE-2020-8608 Two out-of-bounds heap buffer accesses were found in QEMU, a fast processor emulator, which could result in denial of service or abitrary code execution. For Debian 8 "Jessie", these problems have been fixed in version 1:2.1+dfsg-12+deb8u14. We recommend that you upgrade your qemu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5vfKMACgkQnUbEiOQ2 gwLxzRAAwZtDxra4oE1x4hh/dLkHvtMFmtAiHJPai2tt49VvySGfYb76e1Rl13u7 NGJDjswGi0B2eTsisp6+Lid4yNw289e2ZX6YJ6eazhIB2dh0Y3PMqrnNj1Eu18Xi foUf6K0zg5My7pi6CjFfzpL0z9Zf8wsFo0D8W1Gf5j2w1No//Cn/n+vR4yJMj6GE cwpmITgz47gfRwCmSiuBCu3jyOQJil2yvP+efkrO10iKUTy6B+f5C+F/LyMTRQtg clMc8H24YLS9RFUIo1mraZfmE18BsKGHrfGHJ/YgPS6TFLmmu5vtYI8wl7galzov 5xzsJsxMpu1qfEygp4RpjnXllaFSBLv7OS0am1SWZ+3aYnAdsW+W1hNSNxlhn769 EmXDytgSV8VVimEk3lNLlZH6N97c4flocaTk5QSNNse1HwAKQqvb2lGy4LrrxThj uCnP9SoNEL+8vcZGR2N2vQZN2EYDhIZkmRGRKQcZGqiKh6bcvaF8i37C4+Y146MP ZlZ7dR4IBtB4sQyyAbtiIBCaWVxHCWzMGqbOkdJRoEg/mdB1pZEsRSI4UZlQlUSo Mzd3fXqgxLjbw+zHx4CBWVZwnZf7cp5zn59EVEABE7jO6PWH4Jh+j16dpwich/Y5 f9UBXObUeeEWLpRCQp1CStQH0Lg7JAww7sLQPZJ0ZaEKISaJx0I= =Krj3 -END PGP SIGNATURE-
[SECURITY] [DLA 2140-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 68.6.0esr-1~deb8u1 CVE ID : CVE-2019-20503 CVE-2020-6805 CVE-2020-6806 CVE-2020-6807 CVE-2020-6811 CVE-2020-6812 CVE-2020-6814 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 68.6.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5pWWkACgkQnUbEiOQ2 gwJdFRAAmiEkBAyHnzWtzQ2ixM25GSK+wBG66SmEjvpy/57+VjU8rTeV7ZslIlAA vfRVJU2wlMQbvMHf+ZJeYq3UkyRYXTPEL8Z6tvRSthUfJRDL+7MRrKIt9ubOMLfX 30FPTJsDAg9C2g+vQLOf+dJAVM+aWG7u4R7N6UabY0N6aa1nEKNHYUnx12xNblDM WAHtb/e66+l1FDLZcyEUz9M74YrS1OObH6BF2wpLEL30cP+D8j1NCzK7Ixck6W6Q GT5rTg8hLCht+QFSAwe77ySaXksy0DLzN4XauACE67Afn10dZcHbMST8W5jO9ZwZ g7Dq+3iw7o96ZwnMVz8em7WEFzDBCSFQAmz/hGLVSZhwrP3jTjAwavqFFLiLM5sQ 2MYXUCr0VGuTZ0zgcMSmazRb7+F6K7X8wcDZ0g/VYKQ73+76FePGpGiwI0jkJJct ZvzSjlvjCwcjTAV5xiJkjtL4cELew1U865B6hw7Woy5jIJtap6Dp9kTRWMjtXAOs EPhJQhP5CyKsbsZ09757OMb5parlgDiv18lMCScR2L1DYUKF0M1le1QKlzTzKBBo YEVvfvbVwocMmQRKEGmv4EQf/2RQHNOCOvgq1oe1EZ3oKVxiysPamzM+ApMkUZOV vU1bFnryEFvHowYb7SQlZET+OVlrIF8r9r5RQMIjf7LHBAl9Kow= =HkZ8 -END PGP SIGNATURE-
[SECURITY] [DLA 2128-1] openjdk-7 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: openjdk-7 Version: 7u251-2.6.21-1~deb8u1 CVE ID : CVE-2020-2583 CVE-2020-2590 CVE-2020-2593 CVE-2020-2601 CVE-2020-2604 CVE-2020-2654 CVE-2020-2659 Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, incorrect implementation of Kerberos GSSAPI and TGS requests or incorrect TLS handshakes. For Debian 8 "Jessie", these problems have been fixed in version 7u251-2.6.21-1~deb8u1. We recommend that you upgrade your openjdk-7 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5aVpwACgkQnUbEiOQ2 gwJGuA//ZoFOpmYlHPb/YxT4vLO0u1yyqREBRyIsEWAVvuCQ8fQtbR14pgCsFCCT fz84w3h78CPNuhF9Opauz8e/cthejk/bThj4SLiCNFICM2QgBQO+oV4dsXghUVc8 c3o1v8a+nw+ElZOSNgcfvXh+3MyE1Gp4TWpmRY6ijm/Oj02myGHGUYHOcvyD1/0Q AsJTL3wb5jj4Vy8D/7D/JCXq6Y/ZCcBrjyPK0KeQNAlKqIvhSnuknS2vhvtURtG3 t5wcjUl4J2wvBO7FNEps0EwGSABmpsfy9D779YHailJiNhmYx4dQ9staorCqElLJ dlDqoXQT0h9jHHGR/St6Y6+NhINW3i1t5EEbes9dtqpyvrd2bJ0Fo/x8wt/XwYaa 7p03L7cr1eob2SSrPtFuhfgRTEFEFSShpY1Hyc65i9JazBw/HhgK1fs4GL35aRgm 5KLFgq8aKgDBavILTxtgw6cNaZGF+WBh1yfr3QN682IlbZ8LbiQB9zTt0Zxjo41Q 1d+y/A8wfQ59+m2/fCQ8Wj+RQrOj/uiWGHeTX9z+UL5pptQsceoAAmM+jyXgAR/e ChMW71Lyc4sgV3TxjGQ4Dar2WuQJ8E0N7CleSSIywgpYsjiR6Fk+aTZP4eF1PUJv FCbFK0e+wowmXixadw21GfNbtyxV7JtLTAYCAVtPOTDl7YtCLR4= =dzOx -END PGP SIGNATURE-
[SECURITY] [DLA 2119-1] python-pysaml2 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: python-pysaml2 Version: 2.0.0-1+deb8u3 CVE ID : CVE-2020-5390 Debian Bug : 949322 It was discovered that pysaml2, a Python implementation of SAML to be used in a WSGI environment, was susceptible to XML signature wrapping attacks, which could result in a bypass of signature verification. For Debian 8 "Jessie", this problem has been fixed in version 2.0.0-1+deb8u3. We recommend that you upgrade your python-pysaml2 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5WU7sACgkQnUbEiOQ2 gwIIAQ/9G1YRLZmT/Hiui0FpnPw8shMF4aoFl02VSUf4Vk9HlEgW7hVUJrpOTfMf DI4O8e3pJq8kqvfRPUWLarwGICm40U8UBBUNM332nt6XWxf6Tx/vp4Jwzx6r9b0v XsuNfHYOMoC2zhy52VVpe50Xwu8GyuKHyo+OKNh1W0lYZowec2mRqjq+k3oxno82 ARzxZdCqwV9X3V6Bk29fJSuVxmEtEos2Yw/JIIPfA3eWsDQZEKItpAuaiZpVwadH LiOhG7rxC2hR949x7ewGXCRBksW+Vx0jW9iMGrbwkTjj2iT+6X1yOTDc4EU0/EKy bn+wH9XaG4Vu1v969xIJY4ikFch/2vprmR2K0OB2KmqCKGI4FwsH21clelybekg5 bivu1Er8mz1fG5LfFQsOYLDDFh3vf2L1yTzfDs1Uw7ofLpFISSAH2FL9j/NMYTlS bkqWkbJXm/y6XdrMdpjHIWYktW7BQKVRYRcw7pj6cFjc5GZL4MK+7Em1DUbBTl0n MBVzIz2/pd7q/wV01YIQsrNTdVP/ne0aqmoUvvpUZb+SpCJN855qm5FxV9VNnKks HWtTTnH4CzPssx1/mDrWk9RyNn2uv2QeGM9HGBirJxc8//XBACof5hPmEUSQLaz9 zfCnhSRtx5Qv2zCnpz6dT/pjcZCUSn0z9/rbq+vx0zwkXC5pcPE= =kWui -END PGP SIGNATURE-
[SECURITY] [DLA 2111-1] jackson-databind security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: jackson-databind Version: 2.4.2-2+deb8u11 CVE ID : CVE-2019-20330 CVE-2020-8840 It was found that jackson-databind, a Java library used to parse JSON and other data formats, could deserialize data without proper validation, allowing a maliciously client to perform remote code execution on a service with the required characteristics. For Debian 8 "Jessie", these problems have been fixed in version 2.4.2-2+deb8u11. We recommend that you upgrade your jackson-databind packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5Oqe0ACgkQnUbEiOQ2 gwLYqw//e1XLJ1OluHoMmrM/STWiS2xV3LU9LMLX4smVl0hyhOHp5ASVEFVUt7jy Djfm8x1HWpzsOJc1CZWhdp8Fo8Ya3M30WQy9C2xxe13/EQivATSw1az7vSG6Rav4 vNE71hGGe8Gcj36ZDIsA7uBBuAn3UnU0oObAKuYv41hzhOlKTmWPqIdjee3juOpL CLiXuqSTAgG6G/FnwU4rGMWZf6SXWsl+UxHmpP0QqJQqqacYDgQ1yj1UAEOY4+6b gEhvrqkY6bmRc0wmDnGc/LaUQQy7Ag3WRaee5Q7hwjEQuzfwWVazE2YUvoNurUd9 +FfXRFaClJ0W6cUVcjH8/HzamboFu481t76y6yTlB35ghmCqsnTozDiHZ5HuIFJr HzODt0CP2sNyHRCcuTvMfXcZzOGTzUipX/zriRMar3KuAYnLqBwilpBtnsOAwC+Q VQLXqsO/5sNioCQhhvnmY144fit7JXF+VD6UWCySenQfoLJZqVqlL/N5IDJfpVDI I6BTdK2jJBb4bpiYru3WweShxisB8/Rsq9DexIE6d9BCK2sU1NJmls+hRKTsOR4H a+mDZlcyFwVMaylCm15Izejgg7svY06f+GFLpWhlcOzVvpdYfXChB1g6l8DYINEa OLK/IZU6b07/q6nRWBvd68btR4+hkMYa5HAwwsQ3q/fKqj6ZBpA= =EuIx -END PGP SIGNATURE-
[SECURITY] [DLA 2112-1] python-reportlab security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: python-reportlab Version: 3.1.8-3+deb8u2 CVE ID : CVE-2019-17626 Debian Bug : 942763 It was found that ReportLab, a Python library to create PDF documents, did not properly parse color strings, allowing an attacker to execute arbitrary code through a crafted input document. For Debian 8 "Jessie", this problem has been fixed in version 3.1.8-3+deb8u2. We recommend that you upgrade your python-reportlab packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5Op34ACgkQnUbEiOQ2 gwLfHRAAp68TGkny/FXSIgC651iuUkXmYs+JYwT5k3TUGNykc3DZ+4Y1Xzbr8F8w OIsVmrh1LIvTaNM/ZG6ChS7ThuP6oaeQVELUF4CmUgD55b2aIoUqYh20MVPawDTG AEM0QDbn7AgkfSGUJlAk3sT748aAGEz8DxXjKHSo03PmqJRygSlBuX5vINZ7cekA i72gtbd3b3dK0PctpeMz19ZDg8ku1tKS9G4f8mpDnjKJrjJ+VJD9XOS9XlXi0WWZ XoYTlvku9QojiUDWpy/gXc6u5LF82Dak1eRJssjPemDlRMcwdDA7b7by+c1rZswU 3S4cOz+Cygbfe9unzKCvu6ub7dyWMIb4tuC8LmbeTCeHwVU+1Ajx8O7/s4AO1t5O U+nchSBgd7/89mNuVHcxBnrRUFSMC//P3Qdl078cnJtouD710GCmoV/oz6QU01h3 y4aM06x30TFwo8YXBKXsSJc9532rVRxsI1PIC2U36Na28Grw9cDcIb7r9RWuv/KT LneplEjpWDt0BBd3+SNVAYreUodNsTxp1qpmW2JdGUB7WoLkqW5bgOZOhtbAfYMz KJHJwbfbg+QurJJeGUnl+dlbk6wXwksIT3zEu2UAmm4lNWDwuW1/DOHRJ6UFoLsD 9vWLeaaYaqrpwL+3ollkxHE+Bwb4mF3V6QvCbkTgPqRtp8wUTOM= =Xsug -END PGP SIGNATURE-
[SECURITY] [DLA 2108-1] clamav security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: clamav Version: 0.101.5+dfsg-0+deb8u1 CVE ID : CVE-2019-15961 Debian Bug : 945265 It was found that ClamAV, an antivirus software, was susceptible to a denial of service attack by unauthenticated users via inefficient MIME parsing of especially crafted email files. For Debian 8 "Jessie", this problem has been fixed in version 0.101.5+dfsg-0+deb8u1. We recommend that you upgrade your clamav packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5L3ugACgkQnUbEiOQ2 gwI/QxAAxjZi+qbWt+xjyStNKIQ3IFFNFkRRpDnkgjBuH1TID/zSuwMBIQlC6nh+ 9bVW3HHdwRsvkBs9VVZ/aUAgYjAX6GppX5Q5QEb1HPpDzPddnXZbUP2sWTg32cDs EzngxlTxsfPTlQhN4f+vLJRUOEwX5T8/66BKjK0I2DQz+Rs0K4QGYJIumDsORML2 4uKNBua5jq4uricHq3r3QIOdVwSj1Vugv44trHXdkn2F2cKr58UYVKFC6tthbpXB +S6ABd0cXg2z83VkI3Fmyx8ERecNAUCAFJkdRTYgBBJ/JtLHRZEuPiuBLVFscoMy OQfxuJb86gQLiGpEBjymCM08+HQAQUGMA7CwTLq0FRHAIHhi85ds03wVBvdNUkgN Eze16BrYL/9Ehtv+VNfdTGaHaVBjLrSIPTP+m6MEahRDGHouBesFCmnBsuPVLQ99 TLchI+1Uu7FPCJp9ibkWapxTvGSv7FqpmMCtaWAU19j6GLO6VBTcFEDMDBy8fG0P uKb49QSPEjXQwaHaL6czWlYBpNW2eM0WiR9FFID8IDQ4YfPqtMHmL6zRtJMX99C+ VR5TEj15eHkqhCW0D/mFQO8krDyO4s7aR/dnyTnPaG4AEP30/qgX/ov0n8dZcWCb 9QH+5npcqTH+DOhV4eqc1uvNu5AwmjyLb1hvUJ2yXf5bN6woIsY= =zThz -END PGP SIGNATURE-
[SECURITY] [DLA 2107-1] spamassassin security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: spamassassin Version: 3.4.2-0+deb8u3 CVE ID : CVE-2020-1930 CVE-2020-1931 Debian Bug : 950258 Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Malicious rule or configuration files, possibly downloaded from an updates server, could execute arbitrary commands under multiple scenarios. For Debian 8 "Jessie", these problems have been fixed in version 3.4.2-0+deb8u3. We recommend that you upgrade your spamassassin packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5L3psACgkQnUbEiOQ2 gwJ7RQ//R5YJn7oGBYS6R8WK+5xBrdaGLLqLufv0lKGmE5verJrf/OgMBLZSO/bQ hjjPjHJdJI3Bycbj9iwuGezAqzTpxNxLt8+GXst90j0oBAot+JBEG8omBkByYTxn Dgrsb3ATZSIcwt3shh8jF/HJxthX322MGb2h5jYgGPGHXKOjCwFjtZ5dd6DQODd7 AyS0AVSiOylo8DQRrPDkZcbcPURbhrH9cMFQ1FbWYLiKhI0oIfQvYZGiIIbp/ka/ +cQyUiP5kMPiZ+GanguRbgR7kzSFFYz7p5z3rYjdr4kKqWdgq6Nnq86xGp4fa/Yg UZQFDjNeNMRGpI+Hua3oEZW3M9hL8uzfAvpbC5g5hFWE/eKp7hqHTnvofsAqd7II CBiDZa9EOe3h/qJNPwCqEooomv1EwmeNE6SWrlV6tm/EEoVDXrpnN11j5kfGE2sJ ebz/ADc9zzNuK1ENAllxZ5BQOUgWR8CSmPLTNoJsOsrdxslev/jmEWXJe3oZ33A9 gLu0W4uWclguyU1lnLbb0ec3iG/VglliuPaUgqOqRaSl+/EaHbSsziE140XQ6GGX dVndukOIJ75oNo1jFu69UqXyU+uqztb6LG1qF3+iOa3XOnbAb3TXK1c9RwbE5ckP KaEIUmjPfeS6PkDMzM7f4NIl6dYm+p0nlkkOxyyhVKJz4qmuors= =CspL -END PGP SIGNATURE-
[SECURITY] [DLA 2104-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:68.5.0-1~deb8u1 CVE ID : CVE-2020-6792 CVE-2020-6793 CVE-2020-6794 CVE-2020-6795 CVE-2020-6798 CVE-2020-6800 Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. For Debian 8 "Jessie", these problems have been fixed in version 1:68.5.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5KZiwACgkQnUbEiOQ2 gwK4/g//aoMevKWCUSz6wrEmw3j+BPCxj1u/+aoti3m0v7ZeIFG/+Zq+FlBejtbe K1jYgvdwaQk/2r8O5GLbryqsUPKr0GVZDmEgM8kr53/lIxUyIZ8AWQ6i1o0x/9b4 bYpjrTpd4gyPCIUs7Tlbts16KHbTHGiiza6nstyMa1gOClYh6ZKYL9KHWDnrclbc EapkPqo6x/SWfqvdV/4szpymBSH56LumbwkRzdgSEDKiu9UIkntStNs0OMtTqVet +dbO1XyC0K41wmF8HhBvNXBp4yjaV4RbADfuqClWqEvVaqq2EhcLNVXOdEct/m4H udTx4XfTgxdwZ+EwapsgTrAncQ/LSVgm+wZEjzYOBXXkVkJuz/Gw9NtQd14klPFz NFDJBpUbcJ7psdsTIz3vBiSD05DH1ptt8/2DMGSUe+QW7rUEUK1PBSLAb04al2rV Say36hfwl2iRfg8WjSPNzVVbMbqMCRr9vRPX5yk5TVMxOGeg3mc7XoXsndD+MW0C yDO4UXAdtg86et62MJB8HWT4NIdYTudF8I75nnW+y9C+fT9DIynxjNCVl5xQz5JE 03kbSa3jvTe8VR4YalG6s5XoEqfirNmeTqxfLYIER5ss1JSHpATT7AUWRNfrr/CS ceD9e55sXzZD/fGfEU4PxCXSJYOiUdzlKJh4kaD12IOIGVE7h64= =nY5E -END PGP SIGNATURE-
[SECURITY] [DLA 2102-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 68.5.0esr-1~deb8u1 CVE ID : CVE-2020-6796 CVE-2020-6798 CVE-2020-6800 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 68.5.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl5FKw0ACgkQnUbEiOQ2 gwJ/SA//RwKqkIrY5CuPDofz+6usbil7AWMeEE3G32GBKLkt+ftdK0eQQW76s33y xhAFEOGxtUioo44wDVPMO1hyoi9FTu0GBVNDGWCOwaYCVoLwJdUS1OsVidP/l4Qm w+Czadj0ZX3LitDlgGx0YCxWIg50mq57UAsRNs4hR+WDnuvYKSVSQ2LXLqTXp93V vPMCkhmU/oosbr3HTPcPqU5/ZWULL9ucN4uBuTVD3hQKF9Ybhf19AgU/Rs2cEInL OJRaFzXR5GFVnG7xkaCjZanDIw6C8Lvc5CaCoP6dJzE9vOgQ6X1nSoW10GrmDswl 9Xyf7XApjBRMwCJTm5CjSdLlFwnTpdJ1L+Amc0uxYSh4JFFw69G8XnlT73d3Vn6H WY3JkJ9oBK0diZl5nzFPF8k+Kk/KNH3/f8tTIKpvv2dW4F39nSlTJR1yaivHczJC jEEyKjOlCAXNQRdCcfxvQi4RuPqdOzYZxCOAZAEhmF0g0gCH0+3yJ9FcGkxiv4x0 4+A1Ncz0XbZDUwmEqV9odYlFRmSXzLV1DbGxPUFd055TxrAKBa5Q4guOmHihuzHT BXDfKrppQAR2hTFuGvT3mZSjlatf29PIxVdTEUOGz+RsfoaADlYbPhpFbrB5QRcR e6RKA3X16ZaSBmQB28gsX6QbGduND/kjQyJGuLokTT2+8hiW6n0= =uJs7 -END PGP SIGNATURE-
[SECURITY] [DLA 2093-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 68.4.1esr-1~deb8u1 CVE ID : CVE-2019-17026 An issue was found in the IonMonkey JIT compiler of the Mozilla Firefox web browser which could lead to arbitrary code execution. For Debian 8 "Jessie", this problem has been fixed in version 68.4.1esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl40+3IACgkQnUbEiOQ2 gwJPDg//RYUr2MqUQyHkSA1blir2bcv3+9il7z7j/htwxlduNpHTkhNqU1bKo+Oz TntJvUM293ld25ctKl/rUQzyxk8ps71zXaws6ipVcC6Rd72CsN3+CP22rApdj38S NdhseOPtQnrfDxONujbeke8IGkiYLvSXPkHnbwSO7k5gV69/F/gAjNsMlIih5ia1 wo8jOncmGx057a8FQSWin6zooZ3Rab/ezHIgrj9KYRWH7mEsOvThQsNIJPlxgccb MSs7uGCaqzGXpB+Ay6NlO4Ockfew0RxWCnItsa5a23JHSkUWZpc0nzJgZHUBa4vN 1DwLMdxVIoa0S7mIYn3amRnpr55oscKyDUkQF+DHjsYSK/y6DIFGVHt1yn0bLlWV 0NAQjaGiDoVO/t2mLSu+FMIK3QEsW+Eya5Z+OJF0ocpRjs082slVI0oFo5H5Hc6P +Smolv7ycmMM37ByOx2IwSZR0i9kQ9z4IUBC+wRtthpHMdLWdXZ82uKBMW477jZB fL7S6FKEMGuP6GT065px+vuANQHnfZUem6P0Rhykg/xZoX3J20e6ILFoxV5hXZnW unXPgG9ERGHOhBgq/wLSxAVvNBEsyPitNwLv0wl+i2GIS9rZYMY/srUycWf6Q7Yz 0777ihDhmvj9+mB8CukUfOnsslkHGh2cREAJopftV7hHKxqFdp8= =O7i1 -END PGP SIGNATURE-
[SECURITY] [DLA 2038-1] libssh security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libssh Version: 0.6.3-4+deb8u4 CVE ID : CVE-2019-14889 Debian Bug : 946548 It was found that libssh, a tiny C SSH library, does not sufficiently sanitize path parameters provided to the server, allowing an attacker with only SCP file access to execute arbitrary commands on the server. For Debian 8 "Jessie", this problem has been fixed in version 0.6.3-4+deb8u4. We recommend that you upgrade your libssh packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl34zT4ACgkQnUbEiOQ2 gwJIUA/+PXXlcXZb5KgXPkz3vc2C9ZgvXsZAJXGI/+T+mbjeYeVhK80U/QSfaGQ+ wSMdfvXvw/yBOqhql6acRlYdvvxYrHF2jGUuaf0YD39hFCfoGKLDsrzi7qUtYMN5 vaP1XttiXKz3+/iMatVKD0VGZ+HueBz2ovDwlC9bNS06DfzknIszRI+KS3OlHPc+ BGjtJ9psMxiXkloF7b9+3SkZqqJ+J6XnaHBzcVh/vfsC8kxmfn/Yy8jkc1Ul0s+o 74H+uQJftJZL2doVljOteDNj7h2ljGbY63W5ZPm4mUBk5vy8Bj+P0sY2h9v+Yuey +bx6P+YNojtlwU89n3elpHhudB+zqHOa9accDqSyAvw7FsB7M0E9PM9oEjDdswI1 pd4FBkIEWdIpcoXBWPplKESt+Cz9Y4DiV0mPgYpp73jfH37B7C1afxbOxSn+/J8o 7QLg11NbcoLEnMbnjRa9jyYZG6c5PBPPXksaQP2LrqLuCBQDtSHcsEHkXmG8KGf2 5/Y/n+SwQf/HMozyoybAzhO6Q9K8qL64fz5gONxLZBakS6qKFE1RD9+sCHZBr/dM AKBUIp+8n0F/aNo6zRL+NVtSN7VShc25gxk80pfH/LjzGVeMgWkyQZ9Etb6Fbv6+ LfLvqKbjLC9kkQTr3sYH/Nv2aABtu2MAIB3D5EGpb2HpzKN0yec= =LgUv -END PGP SIGNATURE-
[SECURITY] [DLA 2036-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:68.3.0-2~deb8u1 CVE ID : CVE-2019-17005 CVE-2019-17008 CVE-2019-17010 CVE-2019-17011 CVE-2019-17012 Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 1:68.3.0-2~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl33d7EACgkQnUbEiOQ2 gwKbZA/+JfVfZPwns+zlBPjozGMrciG2fTROS5f+OlOWRcVYAohbosS2xKco3fHR Lh/iutmiK+pTqKbdiC+9sW2MDfVfdCMS8SmALg9qEQFVyMIXVWAal5OwBlDMdnkL wpd3dKQWlvMtA7AZVc3rLswPu9oCYR0L6J0713TPTw1j9xYRnTQxJv9XKk3wc3Xo E7SuQvsXtBC9SsqF+NBrKfETH8fVEzeFPMw75kouvMAzx+T/rDxq6kXAFc/MdLki CGd+Sj79kWzbx5tw2pOByPmazXz7Eb2F3UCVOdTEMMNnIRjXUC1EET9DIMA6p6ei lwFg6AKHXi+hnEkHLWd6nchzcXrDmcVTNVTtd7v9jWOmAelZcennoCPdoCVn0KJf 2IDVhgar6kevUrvxvICD/4+lIQYDpVAotRx8oY6pb2YKc6T8jKyJSZ+Ct7CKeInV 7fDz/e1Km21obbZquOrOLGYg5/Q0us66/t4glks9TB31p2OcIhaFupo+Opu+ri5Q uIGPoIrKZkiS+Gyp3seFz4/e6AFiRsPNZzO85uGyIAwJioH143UY1aeezCRUNZLQ 7ktVF37va+KI+rS6AX8IvWfr+cjs+WtNJJ8/o4tUOxq/mNjg5IqEFdeJj+rQQ856 AV1rnojXX/goVG3sXLZnMUBochMBwU6Lz5qxBqGq5KYopOT3gOo= =4gAx -END PGP SIGNATURE-
[SECURITY] [DLA 2029-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 68.3.0esr-1~deb8u1 CVE ID : CVE-2019-17005 CVE-2019-17008 CVE-2019-17010 CVE-2019-17011 CVE-2019-17012 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 68.3.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl3vmo4ACgkQnUbEiOQ2 gwIaORAAvAWR0dnQ3rCX/GAet5BaSt/G62c/L5GE18WzaD3xhLtVIK4/tfSn4ZEf m2ZMRj55Pth8NB4hsOjKjKgXXjlpH6jlCCJZC2MuLK7MOrzVpKjr6EmRoKc6q2SE g0zR49ml0mK6DRcDdXsAJCtkWTAF8mcEsO8LoYbXxZRHW70jQ6e1+OQY64I8VRcG bDE7mQ5n3jxfyzW/BVyOce8fWMEeuR2X2fuiu7IC/kdQCMZXN1LtC/W9z6EHB2Kq hA/zpt847a9LsiPfhNa8SND1DYqgfk6K6lUQlUnDIXM5lbp9jW+AWJTkX7qmryRk wbt0vJSfyfpgoyQsugycXVD+fFWA1KMwp1YDaBq40awaukarLWlAT5KC2S6iOaKu LeLRVnL6880r1A/hxHE8qKW4EcJcJOiu3ffmQbh0KOhN9g0YoLYDNazLi/BA+3Iq lEUPBVaOnHIdlqNMpzBZlOoj96rgRMyQ1GM1SphfX3xc6CwLEby5eEuX/LDqrC0i MPuwukBbu7UBYNcN3FGIcMCJnwd5N11ssGeUkDHW3gu3FFq4JqvmewbX9fkM+4H9 RWsqVyOb4WSmasKrSlMnG5HEFbFMiBOsGf2IoI2KsWWSOEcRGEPuIsk4htwprzHB qINScKLzDy1ohsD5lOGrQMoPYeZ23H1rEDlKlWS4mWY/4GPbd1k= =2dew -END PGP SIGNATURE-
[SECURITY] [DLA 1997-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:68.2.2-1~deb8u1 CVE ID : CVE-2019-11755 CVE-2019-11757 CVE-2019-11759 CVE-2019-11760 CVE-2019-11761 CVE-2019-11762 CVE-2019-11763 CVE-2019-11764 CVE-2019-15903 Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code or denial of service. Debian follows the Thunderbird upstream releases. Support for the 60.x series has ended, so starting with this update we're now following the 68.x releases. For Debian 8 "Jessie", these problems have been fixed in version 1:68.2.2-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl3Sx3EACgkQnUbEiOQ2 gwKafg/+PNjgaQUy2F5qhcE4VkpwoYMSefYGzSSJnDELOnky43v6zxJeBnAdgPX6 bPeSc4hB2T19cSaJpRrFfj3pkEtJZCT6Uc7vDpCl5vEkgSuXhmcilMyRd1/+u3wM dmXmKyGMCjTEDMosqjflybccPKHaPAU9HPdngjvl1r9sbSu7kbLwT+eJcNYfqt/6 3jzPsgTw4tMBz9BkGTbvaEGBAIOLEkQoDbZPHXuDgo6DVI7dXf5I8z7FbVSKCumE nK/ziwMhFMR1/3rGkiWnKfrqvYSCSob1j4cE3yrj4hxrslP0IBdL7aELI6y8xqIL J/WakEJUERuOPDjJV3V0bjWT5LjvKZvoWzMcBMXCWwYcx1mfpgc6R/VTxUAsCGsi tPF06JjMamSG2toy7gqgSxmxAnMiYUQ4mH5XX1K1AXXMpG3OHq4fmieAZYeTPzOp 6Wm5NIjkRlH2L2Hmym2lch/WsaeIzfWr3JHpPLyGa+9kgiYnWLgOeCmtjjsUGf5K R0hFXlhSrr4oUamcFNBQkVrjxmZo72PLsVIask8MMgPgQfyFp54xdmL7jKWZkNen 9Dr1R84JQqmRkYDCbopJjxBHlQBEugMxjWWvHVQOBSMZ5aatagVnq90HEuEjMoj1 nZXGePEzyrK7DSb9uQQh6Dp9Bh92DFwzzBMNAon96AwFhn5i8CU= =+Fk8 -END PGP SIGNATURE-
[SECURITY] [DLA 1987-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 68.2.0esr-1~deb8u1 CVE ID : CVE-2019-11757 CVE-2019-11759 CVE-2019-11760 CVE-2019-11761 CVE-2019-11762 CVE-2019-11763 CVE-2019-11764 CVE-2019-15903 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, information disclosure, cross-site scripting or denial of service. Debian follows the extended support releases (ESR) of Firefox. Support for the 60.x series has ended, so starting with this update we're now following the 68.x releases. For Debian 8 "Jessie", these problems have been fixed in version 68.2.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl3H3VEACgkQnUbEiOQ2 gwIvXhAAkRI0XXZDmG8//koXAxGAPLJsvYSixbr4idDiCmh2i5Pha1t1FzGQYKBq zhTj0PG9opf0FyQTrggUNrUwlkReXqUHYsJgBMZLZLGax+joZ46+2He2bSc8YC6u KQH7EPvYD1soPNVnW+EzzPZPhBJOE+zFWBsWYiughkOCjd8xOawBakByt/fa+GF3 6aOB+eq7dezsthwzL0Th3m57bE2htPwIWvmKA40rSwae/zRC8rzSTTtSIzAsBv58 CE5aklqWcJtxRfFJDbbFh4FL6WZwTkDNPlGjLJYyyN1EGDi8EJ17ARGeWvixSHS5 dgiPyCmT9rHGUheFnlHTGUhmxbhUxAgfKs/+eXOfG5e/ZYB+qm4ASl/o4BVA+c78 8pjFhxJbjBjV7ENjOAyS4E9+4GjSuhSNlkO3zP9BI73qy2sAUHnfkynSWhA+829U rD9M5PvVDaDBLuVrTDFPuObHVzRCflpKSnQ0sSLXnuL82HQSqwUb+maDFPlc9A7h r1rqf7j+bOpHA5S8XAxbwvGwQy5oZzhQx3MtWDySBqyTnE1ks1VAhiEQLJYSsMZ3 dvbXfDLOd9xHONfEjCpMOT32En3SMnpxYfsm4ZAXs67Xx/TEZO3SiwDyMj0TgK3W R4eCx0HxSBhRMLzuTatBBUS03ENYzzem4o7dI3k1xDqtRbRR5E4= =1L3U -END PGP SIGNATURE-
[SECURITY] [DLA 1958-1] libdatetime-timezone-perl new upstream version
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libdatetime-timezone-perl Version: 1:1.75-2+2019c This update includes the changes in tzdata 2019c for the Perl bindings. For the list of changes, see DLA-1957-1. For Debian 8 "Jessie", this problem has been fixed in version 1:1.75-2+2019c. We recommend that you upgrade your libdatetime-timezone-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl2kWxEACgkQnUbEiOQ2 gwLAnRAAwvD532KZnjg7C4sCRBfHZ6JC3HC2jhzbi7VpDm5IpyUCCPfBsulyUbgl JPdk1aWSgMcC5RwsXI3PTaLPNyp9Sc1Vcfc93sIOltpUGAWcrPiNgav7a1pIoT+V 1d2Yv3nsiSTBmhKSjaO2iqrWQPJOEISAjMNPK9IcjScXC9B0S/sjdoL4wbBv0zqB 7kDmCjLLtBWgsgV3cyru8Rz9rzLtRiWI6wxDC7LpM/7dK8vgvyQaxsXBnM5cdO+h 1WzPD9NKgS4VAHB52dCgd4Srxi6sL9Yh42orWyQUPSRDftlIgah76uUvZuV8n64O /0udneCx2iTAdtL3D6oCxlMjhnRyzn98EQpCPRfmf5EW++Dx9DtGgBgbeIpMMvEr 0fwNkff3BrWYuZuS3w6WZsXQaomhyLQHjGez6uJyUicKmRWm6QDuX1LbyoHQwCmG kjLPU3W+NQ7Kh25U9uMGy6k35qkjIX+eYDkTmyFxp/6JmuDZRWDbfgpI5Thri8Bg eibmn2FjFPoifd7RAzYJDBtcTr2X8TGzMF4IDCTP0TasgFLJh1sAflTwLAJxBZjg tXb91fw60p6nU2Ql/Ga8cgOYVO4xdHsSEIRFhmP8CiuvJysuC8e8h4CrlRJo4zEh 0feFXd749E+H/QjAH40tBe7wNg8LX8b5+EDAevwYBylfw1Y9fhk= =DkqD -END PGP SIGNATURE-
[SECURITY] [DLA 1957-1] tzdata new upstream version
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: tzdata Version: 2019c-0+deb8u1 This update includes the changes in tzdata 2018c. Notable changes are: - Brazil has canceled DST and will stay on standard time indefinitely. - Fiji's next DST transitions will be 2019-11-10 and 2020-01-12 instead of 2019-11-03 and 2020-01-19. - Norfolk Island will observe Australian-style DST starting in spring 2019. The first transition is on 2019-10-06. For Debian 8 "Jessie", this problem has been fixed in version 2019c-0+deb8u1. We recommend that you upgrade your tzdata packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl2kWs4ACgkQnUbEiOQ2 gwKkZA//RFoguYWRS9/Y9n+4BBSWCvyj2bLCBzuk8UPzCgwu5PKmFnO9gTTrKU6u 9x4w30lFawGsco1X4GcsPR3btXGAS5NKOZbgCIgzXGGjdVKW0dsb/SN/10eQ5XLy d6HCcyxgtB9QFYEZUHBFWO+lt2S8fRi4CMm4ZEcIHjcU+ajsq6pr56P3liNHoi3z EK5WpNpxkrmQAX0V/13O/Nxk1ZyNAX33N9G1xbcjSpGqeecrymhAYyQzLj2CXmBP kCnFWcUYS62wlIVFX2z25dMuFBLxgwstA2pOFFc2UnoW85n3ZnPFOtpzBziW5KED nbczf2f/2ecgLRDc2JYkYmCgg7raZaUS5/cvjQCgTzp6SPu5nIaHCmOausUeX+Xb VEnwaj/KRC3DQhp3m/Hts/IOXB7vZusrehcd16cmo+3kpzsgjPUCOHqWX0ltjhlb cCCv3M1n3rBbc8E3U3CuydI9ZciMkM2X9AwpluiM5tvNFvLNC4E74x3GtMCPAX31 oPJlYpgC7mL32zlcvw8SKFN/F5UEcep/EQihGIRLk8+Du4QoY8v2FYf4XT/sKZq5 iD5vuK5ryljzXXFFRac4hH2nS7cnS0CC/JSWsCePHFHld97G4G+u/9yQBCMG6dz0 Npu8RLac70wiD6nlorbk6hZa/ykq3PUl08ClLOecED9R566O/PI= =ZTwu -END PGP SIGNATURE-
[SECURITY] [DLA 1926-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.9.0-1~deb8u1 CVE ID : CVE-2019-11739 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11752 Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code, cross-site scripting, information disclosure and a covert content attack on S/MIME encryption using a crafted multipart/alternative message. For Debian 8 "Jessie", these problems have been fixed in version 1:60.9.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl2CI4UACgkQnUbEiOQ2 gwIJIg//YFmchGzhIuRmjoEX9WI0tQE9Fo9c/lc3e0dyZpWCi82RX+97qmYBLO1q wsrgQk8G/OMZ/yx9zroLU2H7ThK9dcDSNO9yMT0zgWGUHBxATsrkXEPa5fU2pJyk 15NVPdDGJ2O99j9a5DKJT/FV+d1sxK1LlI8ejS7GdpgTnIAR/VURx5bR3COvZMdD 0hKW+uriuwP8/o5DDmelCuhoAL5X9/Qapsrnm5RmOmuGSlzawTFKlrOS1MRfNrmq TJMSPLt4A/AIF/pXXnjLw9mrkTBtSADOH9wOje24feFXn/DyZa3WOWFwxWWTE/Cb f0UAfjY85RdkSg30mFiiz7rP0ffRz2N53bVI8YdC5EtmqB0TLMvw9f/JtLFB2CYr hMZ0tX70rZNhmxNjMlLDFCn2EY0LHXz3zj0h6Xzzy+A0KF8P6px7vi1oaUvDmRKf UUelCM/uooGTt7kYTQvmhsLtIsNwTT2CqOUERXmimM8Q59ICjWG1BIP/LNBpcYks tvOsWUY+bXdvHVTkM7TOk9LxXaubU4CmaOWb61oCCQpbC0CVVpOdV27R0p2Q A04WbmZOzig/JhA/WJJEByuCk7vcZR3kA13sR/WpghK46TNhVwP4DUiK7pJha6Dm UzeqD1C/3fwfPCQJxSbxMTMuAfMZSdITmNxMY80ocxk4PZB/ap0= =FY6G -END PGP SIGNATURE-
[SECURITY] [DLA 1910-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.9.0esr-1~deb8u1 CVE ID : CVE-2019-9812 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11752 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting, bypass of the same-origin policy, sandbox escape, information disclosure or denial of service. For Debian 8 "Jessie", these problems have been fixed in version 60.9.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl1yKMkACgkQnUbEiOQ2 gwKuDxAAg6udaACeWt06mkBRb1ieqyNUWsLN26fG+diKx0HwQC7YXrSHjtaail6x iWPnc6ZIp7slgl+eVXZNUQroh1WWH6HT5atE13e1YpW/0cOcGJLNmFREAoqVpv0/ bTwDEMrjJyRpuvVpACuUUYemVmXKwNU9nvKjATCluwv3f2yN1hnCwXWZfIhcaU0j oTTdEkr1wV9xsj6E8IL2OoxiHTxJ1Z832sn6NfMd9jOLQ5mHbQfLXgl8Z/S3qLhJ 0p9YNUyRF6qJNmZwYJVhZh5M6mgOr3q/1TDBdpdamasKhrQ5KG9sAUIJCGP3sLTV IJxk7FOKy3boMz58WqoldHnIuCtgtNIB2/jmJgkHXZmXWy0s3vEuFuLFH5NK9Ur+ jvcpm/fJvi/emRj1THEbiKFtCQIZhFmu/j+1U/VIXeWK8HDwz+YE8dUIvgTYdqA7 5o2iJAdaz6tT6uytMnrXdH4WKzQfiVtwKvOv2Hegy8jgaaTMgXbZJsrHvrEdfp4J 56JADEfbKSa2tC3Er0PyxVRU1u/vA/e7OikNRkakJ7jTa8CKBDOhWYWjAeP6pF7P /4Z8C2H0d7ccWI06ukLFXbh84eTe39kukO1+eQVSYz2xxKp/qzNWp+eS3ujzd1mL 7emfdlcm/eTDIr6QUkQKomEeOfNCDybey2QxD3PM8d4Rf2ep0NA= =i9ne -END PGP SIGNATURE-
[SECURITY] [DLA 1882-1] atril security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: atril Version: 1.8.1+dfsg1-4+deb8u2 CVE ID : CVE-2017-1000159 CVE-2019-11459 CVE-2019-1010006 A few issues were found in Atril, the MATE document viewer. CVE-2017-1000159 When printing from DVI to PDF, the dvipdfm tool was called without properly sanitizing the filename, which could lead to a command injection attack via the filename. CVE-2019-11459 The tiff_document_render() and tiff_document_get_thumbnail() did not check the status of TIFFReadRGBAImageOriented(), leading to uninitialized memory access if that funcion fails. CVE-2019-1010006 Some buffer overflow checks were not properly done, leading to application crash or possibly arbitrary code execution when opening maliciously crafted files. For Debian 8 "Jessie", these problems have been fixed in version 1.8.1+dfsg1-4+deb8u2. We recommend that you upgrade your atril packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl1Sr7sACgkQnUbEiOQ2 gwLLDA//TEu8+dtgHdyxsQ1/QbND4tQzkZmxnwuLXslnJKDYhivUO0119f/gJuW8 bfzN0bBJ+A+j19kkY1RXp2ZNIEj4vXSKiw+he8vDY8jzMe/jflA7n9ot2faX0an3 FFeGC6gpcfYi3O/YDFV4Bs8wDKaWIlwmd3FvRfBQggRtnlNUMTkTymkA6ZyViCrO uCTSKG9eEpx63wUVUTLASC+t5XpUNEcgCI1CZ3jxWoHMU8o4USRecDoyxPBQ3LJy 1uya0IZXMW7+qr2CuQGW5py5h/LAmyoaIEGA+a4+MnuoYn9pBRSI1KQ9bTFNcJiw PO0ReSrVVbwZsZYCvfGDJlNEEAGbEMjdSvKB9q5peOrkoIxMQnw9a2rwLWgOeY8v TfEct4YwUI0Em75J3ltW6wJzdxeJs485UqxqZDrDzDt5FmxQI0y0vDWBoF127Bzx EaG5RG3fTDIkwKJjsq3z3ttxYrHWQE3oGzfuIPXc5vKJ++OuktXeTXbPMVE+/QZX sdxc7gnS0Nzfbnu33GDE80rgQNjRQI4gPJc4cJyVGBis3DOGk4jKpVZOuR2m1Pob +B+7EPla4DZVT04XfhVSwDdhlwtBdTHSZqLTtZNAPvcSuiGJLd6X8hTD6K5tl6Tj nbc1QdDGaRURAntkSOBla/REbIc1gUSfTMBaCWRsQ2sPer3dRvs= =y+9p -END PGP SIGNATURE-
[SECURITY] [DLA 1880-1] ghostscript security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: ghostscript Version: 9.26a~dfsg-0+deb8u4 CVE ID : CVE-2019-10216 Debian Bug : 934638 Netanel reported that the .buildfont1 procedure in Ghostscript, the GPL PostScript/PDF interpreter, does not properly restrict privileged calls, which could result in bypass of file system restrictions of the dSAFER sandbox. For Debian 8 "Jessie", this problem has been fixed in version 9.26a~dfsg-0+deb8u4. We recommend that you upgrade your ghostscript packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl1SfqgACgkQnUbEiOQ2 gwIGSRAAni9loAOTP4P/H2WNbxT6EmSSCuyvOq3yb6vDHX1iUIpijT1fT1BjMwz3 gYhfHkwZXeFsX8rqPp36jJ5sWJdh689fb4AX8o9zCADwqQ9fURrHa9TYT1NctqPv Z1KIUhiMqmb7EBDxuQjEsmaaW01p20oPeE/WxS+mx9jHRy9Zo74urugN0NtDTbl1 R5Pr4qK6S4cXNQHeom6/A2Y/xCNHAiqBB3BiFBZFOL56PSjvx15xrip3ldZeJtM8 W2zhTspWgtaz0B366f/eIMwYAgQvuT60GN8MMGaIQar+n2b+Im/HWsYMQ84/j/At C9tGBL2e6Rs01cfHP4aedg+hbuNpJ5MTpnKTk8SAhYJMsjQ9ml6Y72UK+WqCBfhe 6Fcv98+phzsjSWJgQPX5RX1Gf5FlShYf/Rj1Up6ricKkcaUvSvSEIkoaACnfIyo9 jP918MvNBbHrsmGZ3A60V5vxanHHhMInCNll0WIcWL6Jmk0hQKKdBXCZ5jlsmlcd cnMEnYeU0+lJDEyBpWzfwyPmKZEu+ZrL2VrvusopspWqlx+p2ofAmCB0JqBUhFRa 5+apw2Uhv/Oi5ij7FAcZ6pFduqIsmD3xBc3HmFNtqNNB9E4cRGD/wkEtHQBayZUS Yhojwp8IcqWBp1DU8x2sS2t847SHW3PqgMexYY0DiqU6B/h1LtM= =rLH6 -END PGP SIGNATURE-
[SECURITY] [DLA 1878-1] php5 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: php5 Version: 5.6.40+dfsg-0+deb8u5 CVE ID : CVE-2019-11041 CVE-2019-11042 Two heap buffer overflows were found in the EXIF parsing code of PHP, a widely-used open source general purpose scripting language. For Debian 8 "Jessie", these problems have been fixed in version 5.6.40+dfsg-0+deb8u5. We recommend that you upgrade your php5 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl1R2QEACgkQnUbEiOQ2 gwLj/g//YbVrMeI/7EqO4dxUDm+SgzS5PGIuBVg2R3O6Hmh+QLqPVdS4DTM0duoR 6+NAGj9kiYwWDZk7mloFTm5bRsKxizFmNNtz02xFMYuQzF94rDnTHyV30oLwz24T DnLeIM+xBbGtLxsT3GetA1q10BzNvyOtsSPpf8bQQWedDdiWTDqDvX/nULk34V36 oD2nocurcn8a6WZxf3h+NzHEck7+058EiKo/RT/0VRZ6pw6zEi0hrELkfiGioNmX DwrpnBiSj78LkV8pO4OOERuw8PWK3dFdgBunTNqKkzpzjXFukKF0nfsRYZbKxVhs EFKfYrTCfZLb84LshbDr8IqpQuvPVrLMD1BStK5AZH8QHasnZa1MnKYNKHuKB6yU d0r4zTDdmgBGcURKeKoVGi/kn8jB3JJMjBcDeD9zBqi9GTmdjy5D/0NVPAuRN2cH njTi/WX7gkfsW1GXM6E63a0awkAWjhDBn/EbDFd6VZ89jOYESV5195bjy21CtayQ vnY2ZY98CuM9SYk9/iWLidg8dT8ja3or9KO8kWkM+x2o5QohKgkR0fbXfh90NFhl B7YD0d+a1+roYyETULpeyM7k2yuVFoEUQVF+ymDGKFbcB49rbsZSRpRPFq7fiMhE MMaO2w8PLTe4iNMJ2yqOg4jGBYUlO6RfOcvaMPjkZK8YRbobanI= =1fhH -END PGP SIGNATURE-
[SECURITY] [DLA 1870-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.8.0-1~deb8u1 CVE ID : CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730 Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. For Debian 8 "Jessie", these problems have been fixed in version 1:60.8.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl1EBlcACgkQnUbEiOQ2 gwJ61g//XEI5cmRL6ODBgJ0BoLAxIoEzSd8RD2ZcZu/uEMFDtyAQdElxJOYnSOLZ eL+M2P1I3A+cWnxsS9VEKPtQA1sAljhAifpFFdq/nZxZ9AIW5voa5XDsYd6e51QE bLEd40USCZK+CGqXKta1lq6yPJa8p7LkPK+0RTG/sxWhTSEp5xuP6pVK81HHEQaf QXYIbIsiZrfMZr8vTWuhAsxwQj9yxAQosEANOGsDi4FFo56yHjysXOHeO0AHVk3k BA8lQmq6poAVtquhoQZ0F+3JBNVEiyPqEcf36ZIgCkVoWNyyRMI1c55SsIfJs6lC z9xq/fgk883+Vxl98TZXCcQ6YurRL41GAAwgZOUIprgzn7ZSStcHWB7crm+7RM/D ++9sUK18mRbTNjCi/V/vwFUPi1kWgXTxdNc4vprl5epPd8YFcNYzJRDDNiBrZXDl aFs5tUpgl0eR3wvRg4rAiWDObbIP4VWCmFTIsfjWOXcQYCNjq1YSp7mSf1dqYwaI tadTLdSOXh1IdTPQx81IeffCzm1mq6lNIyuw4HkOVyn3tHUJ5KJEdk9qK4qnLVU2 z8kqkhySguUP/DiC/rhd/uAzVDzEUC3DZJhPxaqiqLvhK5uW+RcupOjM9/FGgSzt T8SaFP0Cv9JIWQSf6X8MAvpK9FxZRfz0p0YQq+kmbu3m+LNbIkk= =5vdT -END PGP SIGNATURE-
[SECURITY] [DLA 1869-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.8.0esr-1~deb8u1 CVE ID : CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. For Debian 8 "Jessie", these problems have been fixed in version 60.8.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl1EBgIACgkQnUbEiOQ2 gwL/Iw//TVOkSFwnc7bYkXc8B4TvFQPb7bVhINiYun7t2zzAXi/7wzxUdAR4kdB4 mk+uVup3XyKmGWjBjo92R3K4O+j4MLGY4jdOC6azidG4UVFjGKh/o9FuwEQ6iR53 MVQS2xLW+xcBqBGMGINlP+NQC6wr5eh2ngcVVA06PrVQOgMN/LQMisMaEpssG98w oju+WZ/d1YuyMJFZP2uNEhA5cUPV7Hreq0c79Way3qi7BjB/aiSJKie78IcJQkGF 7ddkOULsyIDpif1XbVXeEWYxG8nLUrFBmtGy6jGvTbvxXUqxRhA97xnAYx1RkKTo 6m238yP2wS+YzkVgk8BhEiSdVmWnkf72eWJhAmooec9+j/RC+WaQJqit8bQfb61C lMrnHCBMsKw5KaG3yJ7JTAfU0EKdw7WCpJbwWIqFPRmPIUdJP1sU1MeeCuQ0Rc7V SBToNfjiG79RE7MYKP3j+zoBQzySDm2J5WG9AV4sHxee5JXlayggym5vsV0kwOqc nfz+BhEHUf1EKL0OhI9PLglllAasOnHA3MNxXDewBtfc3Ouii3Wgfegv71i0L9MT qWbz6ElBfvBpuBvRhlgHTIqDCD/4kco6vLJn2O773JevtmFQ8CEyLEPiP6k/GhCr u2LP5pSkElzdX7OhvvPgaBQLnfXyVmoDitfP7nmeZ4AAADmHQdk= =UXyz -END PGP SIGNATURE-
[SECURITY] [DLA 1836-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.7.2-1~deb8u1 CVE ID : CVE-2019-11707 CVE-2019-11708 Multiple security issues have been found in Thunderbird which may lead to the execution of arbitrary code if malformed email messages are read. For Debian 8 "Jessie", these problems have been fixed in version 1:60.7.2-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl0R53YACgkQnUbEiOQ2 gwJygRAAhmsa0VtJx8GcNvQmbjsb3UMpcda8QLRSKBcSWlQ5eKiRPs+NTI07H+RR WsurSfKe27j44aHhNP8qoZSV9XhzTDltem8Ib+uwTkK27zw24XCxFHGzNeN91dbX kPe9WygkGjdjeSvXfTeQmjjLbJ55ynM6wAZtLzyht2ED2by4YHpEYvlWjXdv7iAb PXdM0c8j1/c6JVnFCIz2S6KQej+J5Qpk2J2Z5zkvq3jXJsWHmmLGW0rD/JY75oAm 34x4qEs8nWmxc8GqK1lKX193U0OwtZ8aqrGYDUt9m8995tIcmZygciCjG68LEZIX uBRXYBLJr2neETzTDL8RZ+6uWFshdnKBo4BHeB9siDCc8/CsSIUWsA9NNPJS54kK lShSakgjYm+4XDibwqaQwpl/qkXFwFe0Ovoay+wHIVKiItX1nnYDqyesfudrqcof ZyHQeShEbrbb2k9o34xyKUdcDGoO96d0UxCFGp3+eB7o/iLvX3vPEHG6qTCb3XIA ZNpUMfwU5pOpIemoJgx5IiVZYZ0MwrF6GNhk3iP4DvLMbOAIYROv8JNAd/k4pKr7 YEMy/aBGdy+PM9l/vq7F1YbdtEPoMyjKPjDFqkR2jfsQA7m8be9FJoGj/Pjn7xZ8 aRmMY3/KBYvF0ViQ9P+Pk5Esb/OQVlz44H0HmDtOGKCPuYbApKA= =dqrK -END PGP SIGNATURE-
[SECURITY] [DLA 1829-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.7.1esr-1~deb8u1 CVE ID : CVE-2019-11707 Samuel Gross discovered a type confusion bug in the JavaScript engine of the Mozilla Firefox web browser, which could result in the execution of arbitrary code when browsing a malicious website. For Debian 8 "Jessie", this problem has been fixed in version 60.7.1esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl0LUc0ACgkQnUbEiOQ2 gwKSgRAAoduapUwQ9iT+5a1ogoIV5tYc1KZ2Xya47L5e9cFdSDhGoN9pukflfRTS 8j3rTLpYwl6m7N/rsTX+p2N0mth52MRpjLNPU/CDKPSRQtVqNiDe+eJrbBertTVu PXcD1h7RMRfYRO5oXQsPRtLAVGUF6YDOjtdOz/EEZbx4RGyNCLtEaHLuAfMAvJNQ W2I5renf4amVPpoFuUkgv93NNh9ZxBkkGOwNfuyh4edy4oLmmgXPCjnr+zKKdW69 Jn1qByIcIJ4ndyrVSQVT6ryUI29Q6aFDO3h9MPcSLU7JeTjLRbSDeubMr5t2BNjV jSkqAch5WJ8NDAOYNr7huO/yJYbpOZW2LcZ+k2gcrKm7JBhN3mbL9cgX9e2nIDF8 jkOtYynOCuRDXhVVOP6EZoTM1p8D5ficv9rqOLhBu+YnMhgzBXcx43eUr56HggzY Fl66iJdqowiHDY12Ac+7mHLqKjipS31Ce+9Y80YBphNOGS7Awg1tvvfUznC1B1Mw 1Pafgfuz8CxsEsn8r/NwK97Bszlt/j/Q/3SkGUuH/QAaayy8alvXO+Qcz73TJMrn C5DaUF57Y+KRv6f6qhH32x7mQSXGGvyoJvQj0Fus5yyrgozUJ/o6QPxf9OUK3jS7 emwdo3+sgt5XS8UUgmcnF0mUugcFHqKW/ddI7j+yKgPhu8Vsosc= =xR7Z -END PGP SIGNATURE-
[SECURITY] [DLA 1820-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.7.1-1~deb8u1 CVE ID : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706 Multiple security issues have been found in Thunderbird which may lead to the execution of arbitrary code if malformed email messages are read. For Debian 8 "Jessie", these problems have been fixed in version 1:60.7.1-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl0HQ2MACgkQnUbEiOQ2 gwKJ3w/+Id/5iYIoyEZafOwuIFLjfvnK7ixyT3Esj0o0z0wAo8eju3ewqZeCEnp+ 34TCXnHF89L3SySHO1qduxrKCFmcZc7+R4J1IVgDafmoIyT7ZYsd/LNgP4PWIrZW lf/mMwFGXo8OqBfMvrfr995WN83XCOnWXWdUOa/fSzAmBwccBspWbjDWcjNORu0G Aa5xygY0OpVmUq8xKnIPOZCDndVAqpViLGecYNC5XnDRLLJJR4JWrk6Ld6cuO5j1 gnN+tvlzOws+4nT9SdUKxrgD/DFZNNOMQJLBtb6YevIZJpEJA+COEqyGbCAp+tzk uDuHbqkiLXF5aaX4Y5HlCYtQL1fs+cCTKt0ZiY3HA5OzDVABzoYjLTcZ29xETNtx EXTWpRgdph+4sPysI7yw2DW87GmnVxeK2PkZiwW0yG85VX6ZxZiWqotLYlaLiXzA HHkt8CRFAj827RDDRIbj4RnVBNbxWZtQQy5NFomzIcUbN+mb7cS/QkQIeEYriTF/ wxNDB4zjlnBz1Nt9yTzyy5B1EOFZ22pf3WqKCD2q1YSlMCuNS7wR05D5A+y1kP4M vM2zeDF5Ilts6sZoLPFRgt1QNcSGdI3uxCVqoIaLtCLif3yHksyJigrIWFWBvNVS CAusPGUvsl/onAcs1ewmEHnh9+o4oAiv+ZHmV5RpGGn4zq4S9mw= =isfR -END PGP SIGNATURE-
[SECURITY] [DLA 1815-1] poppler security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: poppler Version: 0.26.5-2+deb8u10 CVE ID : CVE-2019-10872 CVE-2019-12293 CVE-2019-12360 Several vulnerabilities have been found in the poppler PDF rendering library, which could result in denial of service or possibly other unspecified impact when processing malformed or maliciously crafted files. For Debian 8 "Jessie", these problems have been fixed in version 0.26.5-2+deb8u10. We recommend that you upgrade your poppler packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlz4+F8ACgkQnUbEiOQ2 gwIubw/9HiHWpAwhmT2kN6QO9G38iG7J/q3HR38jGa5rDC4rE7dT4iAs3jeU5okY PszkoqZkc63OOhNf+5M5alVD6HIAEbSeH/FALKVTZ+OxLNX2VFUu/tvoH/RTpuT5 VCjgZ4vcPtzqRiuxPVjw/AmVWfVXIVNgHiAf2j+9Zw5d/xdbhIJwFnhYTC/sLaEZ UkSZkQMKHrImbq1lspAg2U0HgVuK+Ybx0yHRiOkYkr3J/XH3+gGktXqvmmR5IXbh 3rSh22mXLnKWErrwEWnWE36/YU0UUzq5vRvafCYkNE9MKyYYpCUpAb5m2dTYzfh/ NgSqJlrt3eG9XrgS9oByvvurZpeYXY1TzKcsTL5GTnJbAK8F70FRKCBKj4lkbJvW 2HOfJvATTRBjlEg6vPNBYdO674UG864j+/BXg35or047L2BF4A6FeR/+ISz+r+Ek 2J7yAdeCu2WmMlZyVZZu5n+e4DgcW55zAm51JDUE66JnC8uSnVJW68C6WYfk8Z7Q 1VesubpqT76FnhAh6cTjP93oEi/QBM1eCzMjUjGEt7gjGNb+42zsda9v2n6v4VE4 ZUCrYaV66wC0MWqGSwiFFYMaG/muMo3o/oFN8z9vmLEMpmTlfZ7I+OlzAxtH2no0 tOmLNN8ix+QPPcXWcLF8KgGxNbHvM8wj53sCdUjo//iRuB6yLbI= =YmfQ -END PGP SIGNATURE-
[SECURITY] [DLA 1813-1] php5 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: php5 Version: 5.6.40+dfsg-0+deb8u4 CVE ID : CVE-2019-11039 CVE-2019-11040 Two vulnerabilities were found in PHP, a widely-used open source general purpose scripting language. CVE-2019-11039 An integer underflow in the iconv module could be exploited to trigger an out of bounds read. CVE-2019-11040 A heap buffer overflow was discovered in the EXIF parsing code. For Debian 8 "Jessie", these problems have been fixed in version 5.6.40+dfsg-0+deb8u4. We recommend that you upgrade your php5 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlz1AiwACgkQnUbEiOQ2 gwJ6hQ//e3FxCHkLhDfI2h1U6c2gl7iCeA3CNE8sGNcdrdhUwj6q/aO4vq7SifqD Pczdrx8eUjJqnRbvyfoC+zbVLv3Hj11EFU8RSfc5KMYjSeSWh3RZV+DR0JDtkjys SI+rShck2Ej7Ajv9XHy/xfseI2PoZ4eIOEBrZgyhMTPBULxUxzIkTUyQd0wcHQsI rAaQR/ePhH59loXagJa4HrKqRQMs0Tk6ZZo8oODbnMXpqysupfW7X/Q3kI4rn5Eq qQbsnZF8B90CptEZpUSu5VEALi4FmB7NMEMx9NjeEO93A6rvF4cFUXKlVsaSalsn U7Pl1wjlBvSJG1M5o9+g7XKCPfG5yN6/ER/NTK/zKNRcwhN6wfMc6FpsFCo6grNf YNv9rqu5ST5F4ta7NEsRo4tD4QlfAFPX6MkBpiV3oOnXe8zZ1M6ZevbNpwFuAOHX jd/T/xCrcZbhdgK2PSc+2PC+eOPbpESbl24Df5CSpNch1rt22c0GweJihYXsF2oK V/SfBN+aDvieRyaBJDRHy13N+3OuB6AiQofHh11w053SV9YUTfcgsfTB5GrqKL47 N7wqmriUIoZKKQox+ynAZ0MI6e7snuRST/r5n+U1mkh3dEl1fYfq93xLmJYX4sd1 LXat7RgOlhz1HLUNJk2vNE77a0Ykwvu6dNuwCAdqyoa1bMXTSo4= =WqNG -END PGP SIGNATURE-
[SECURITY] [DLA 1808-1] sox security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: sox Version: 14.4.1-5+deb8u4 CVE ID : CVE-2019-8354 CVE-2019-8355 CVE-2019-8356 CVE-2019-8357 Debian Bug : 927906 Several issues were found in SoX, the Swiss army knife of sound processing programs, that could lead to denial of service via application crash or potentially to arbitrary code execution by processing maliciously crafted input files. For Debian 8 "Jessie", these problems have been fixed in version 14.4.1-5+deb8u4. We recommend that you upgrade your sox packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlzs4iIACgkQnUbEiOQ2 gwIfsRAApZUUeMcVgDham5qEE5ra79rcBSrdJvbaYrEgllnOTgC675kJu9p4R4vb Tlp8vZv7MJadz/C5vdlNhIW70bnHOXua6P3sdbXf7rEAYWWguJZumChvFORm0Z10 Viiy+0vL1eo73LHQ6Hj2ThrjUyuXGGLd9JrAEHdyug+WwMiDciBsfgWlg+3s3iI0 nxDvJpXn1NpmSll/TN2GhEr6fAeF/PfemdTgV7L3Og3HtDqtZMM79z1hm1uWsSzd U7M37Vh8vKxGEEvZ0EtOsuoRwRCCpZEUtESWysntu9jlTXBFlhCsLSZkAWZyAFoM RWOT2CzZYPdz/kg1XBvCLiKEF+YpEpVfh0j1+Ky7glJSrnK1U2Hj0VoSaHazzVv5 IwI1/vRCK72yiJFcW9fQjuy+ArCvXiJI1ep2vYpi6VB/XHjezdFmk0QheWXusW+Q EfFGsQ2mDYVoZslaSgWiXVPuhjrQitrgkuolwBN6QNIs0QYGmkKmoV5jwGkw+zXj lomCBxQiInoHHs6CGK5QapJ77X5mMQf3au/PHNN6K33wJvMfQCkjZ3Ik0VNUf/r4 ZdnyMmytc+Okxy54WaX/5B3dQaYRk1uQy++zilmqEdNC841fOVlky6KC0zyoK8fT U0bnsER4fZqfxNfIsKL9tvRHomCP5QSJM4fPQ2OjS2EFve0hknU= =+Sew -END PGP SIGNATURE-
[SECURITY] [DLA 1806-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.7.0-1~deb8u1 CVE ID : CVE-2018-18511 CVE-2019-5798 CVE-2019-7317 CVE-2019-9797 CVE-2019-9800 CVE-2019-9816 CVE-2019-9817 CVE-2019-9819 CVE-2019-9820 CVE-2019-11691 CVE-2019-11692 CVE-2019-11693 CVE-2019-11698 Multiple security issues have been found in Thunderbird: Multiple vulnerabilities may lead to the execution of arbitrary code or denial of service. For Debian 8 "Jessie", these problems have been fixed in version 1:60.7.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlzro/kACgkQnUbEiOQ2 gwKriRAAh8FFNQt0oDiWd+OPwn38noQ7w0UOsGsf9t5Hhy/eLK4kmUIeJ1j2HhiL SwHeq32Nwb3W0rTGoETSUCY+iHPAl0VVlshxO60rAlC9gPb3us18x5yqIqw5vWVa FnBxF4CeClLleChfPOBV14kyaWGGxkY2xRJJbVKca0qzKwOErELgX+NOCteaRWwx Z3JucZ6h8iN32NdimVj3gVXL+G6omi314KBelluc03LbATvIMUnUQ67S+iXK8cFc FGvZ11rm60pKHRI1apL878MZO0KGT/Mdk679cvnmSqrnLw3co05dNu+mnys0Uieq gU800oaabTC2tFsj2JzlSx1cUgdEMKafA8+8AIUnKep5EfdlarjEod0+TilEhqfo KfKCv/+oyDqZPqfhuO0grIdlKDpj162W+aSmlR2LOlHmPBzwDt5MXaS0G5R3L3iO 1m5UijOIi2qjHQ+pwP2Gdoe6zQI1iUJXbpR8rGR4WefURz6LW+qzjNqKo+0sq7Ha Z76zkB/4K/dAlt6U2W02KSUzeZiHY+Gr4oCnhjMhLXIjQudKuqnW/rqebia+vV1e uCE14SVtVpyj6rERQkpb05n5GEAFEAtYY7WlNMIi5xhAsgjPAHzFMYDRjjhmjZRS Dy0cB0K4bRAEw4zIVT10trBtksZCgyko/qHi4EwMg5RU3dSBChg= =42Ni -END PGP SIGNATURE-
[SECURITY] [DLA 1800-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.7.0esr-1~deb8u1 CVE ID : CVE-2018-18511 CVE-2019-5798 CVE-2019-7317 CVE-2019-9797 CVE-2019-9800 CVE-2019-9816 CVE-2019-9817 CVE-2019-9819 CVE-2019-9820 CVE-2019-11691 CVE-2019-11692 CVE-2019-11693 CVE-2019-11698 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 60.7.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlzmapAACgkQnUbEiOQ2 gwKVFw/+IIgOR6VqEeqH4Wdylmgs+m8AL2TJu77QzW04+QigCz3U3FpuNr2GseJ3 18gCGdXyRd4uhkCLfn84sFq4CULJYp0a5kb3tFhq/5KlL1mO32bvqWRZvEyg2kdg L0H9tLCQ+FJp8Fc/2rP0PBul3Z5SnHmv4ql7vT/dINcHhRldtF6t/bzInxQZNOIp s2AwfjHzvQ/VpHIUTBtMKJFPMI0SplNiCRqd4QmWk0Mnx8yOLPP+gW1XVBWhVUnJ 1eNs5Noe1X2Ac+tsgTZ62YSqKDJg7eSl4G7JVoFqCKyImIshJxPlq3GcYPZa07ZQ +sfnBKMkERKlWN00DzDXjlc5RgDWlC0HJ83wEbfXvPCn9Qi/eLbY8CFWVTFXUdYI 1UXDz5GdSN4oMAXWp4ZvMp6TDvw/hCjkFXGzInsh9hhEnuXbhq8VJCYX8Ji+CNCO fTxruT2bwu1jT8250PwdK2F417yTYg38oAbx9L16xfyj53kL8d/FfbU5tX5q+mfy jl8PtLn8P4m5iYetlIVzF33rMRFPZNnfJD4RybFTiUKlTsiby2UEaxT0qwHpPUjp T4uruWm45wybbIptPLUQan/Mdx8XHRufvv8IByPPIHfF+PhjbSu0G+C82cKe4etn 4MtJK83fNjRB/e/D6oK6lVyPZFjSsxRIdNinyqoCsfyd6mVo/mE= =0sV4 -END PGP SIGNATURE-
[SECURITY] [DLA 1788-1] samba security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: samba Version: 2:4.2.14+dfsg-0+deb8u13 CVE ID : CVE-2018-16860 Isaac Boukris and Andrew Bartlett discovered that the S4U2Self Kerberos extension used in Samba's Active Directory support was susceptible to man-in-the-middle attacks caused by incomplete checksum validation. For Debian 8 "Jessie", this problem has been fixed in version 2:4.2.14+dfsg-0+deb8u13. We recommend that you upgrade your samba packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlzcfEYACgkQnUbEiOQ2 gwISkA/5AVU9SPoBNLSkliomQy8G/Ts7iuNpuieyCtRQP2BqjeNAYvRXmKbcW6EZ IcpfA4GpJc2Iro6X5dQSyfu4pucPCt79LNkDSz6Mf/UZ4yppbFUXF+fLSBj6NiDM F6eejQzzlA78VQsgGMBaMc4znGMqjZBWXBuin2SFfJNy/BS14Fp48eVYh2hoiDk6 6s4VgmIBX69lGGAYMhAI3W4Tf9EDu6IeCHbJ428qim1RKTq4kRUI3moTvJBkO80C F2NPpmd8cliX6sk5HFKVCX8F6vgOmh0v6wT2cUmb/mHHcSy/gtP8qUsL+9pJ4Kl9 gTqJfkV+VDVYktJKH3w0ZQwEAG0C3zV4Sm8hOeU0o71mgD0EnfMhHc/Eme2bKzRC kHw/jcu443rpqkuK+IZiYrhobDJ5NaILBsV5c4GTVV7NxYCwgzINdIhM5TDDXJf8 R3b6lpWIHtKfJ71T3orui7sKLengrJv0Y9fONfGOkIoExynOR4g+lixGc2sy1cRN euBhFdP4lG0HUnvzg0gIEZeLIfSwsWbCem9iterVd+oBrdrzIBV2CwkI9JCZkERw rgdPPbtaR9vpbGTNmwPPngz59U/TcuqrOrpQ+P8Oe+QcA7bpeD2tGJZa19DiwLda iOxjTkmu3uSM33gCusUlZP8zDJqXfkE0DNkPoJwayOSTkr58xMk= =mYiM -END PGP SIGNATURE-
[SECURITY] [DLA 1781-1] qemu security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: qemu Version: 1:2.1+dfsg-12+deb8u11 CVE ID : CVE-2018-11806 CVE-2018-18849 CVE-2018-20815 CVE-2019-9824 Debian Bug : 901017 912535 Several vulnerabilities were found in QEMU, a fast processor emulator: CVE-2018-11806 It was found that the SLiRP networking implementation could use a wrong size when reallocating its buffers, which can be exploited by a priviledged user on a guest to cause denial of service or possibly arbitrary code execution on the host system. CVE-2018-18849 It was found that the LSI53C895A SCSI Host Bus Adapter emulation was susceptible to an out of bounds memory access, which could be leveraged by a malicious guest user to crash the QEMU process. CVE-2018-20815 A heap buffer overflow was found in the load_device_tree function, which could be used by a malicious user to potentially execute arbitrary code with the priviledges of the QEMU process. CVE-2019-9824 William Bowling discovered that the SLiRP networking implementation did not handle some messages properly, which could be triggered to leak memory via crafted messages. For Debian 8 "Jessie", these problems have been fixed in version 1:2.1+dfsg-12+deb8u11. We recommend that you upgrade your qemu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlzUdIUACgkQnUbEiOQ2 gwKh6A/8CR5876MFmMly2kfPEep9f7arCi5Yr5rGn9c/8+qjjMQRNmrdCea78Gk+ dkGfNQEs//fAyRsYm0+2VwUszvEd0FJvi4pdqCKEQaHFT/6AP+hyZiL9VlhZ3gf6 RHVBAnFSRbaQhH2Us8kmFvSkLp9az6G8scHgaGxe62HZk4rxqiMVn3GxO2OygMqP Scl4V0XEuWHUzpLepYRpatb2peMmwoLg/URvcN3vhZaoyVtbrWuAVTBfUMxhXfVe Gw0wRdzb3ziKqQN3aw3Ao/f+ErOS8SGTyo7ns1wM4F0eIvLnd1McFaZ5Tfs269fb 68wfcMqqz3PZ6bQFXK273jes8krUn8dviHWAmtqf3cSK7iSCrsr/iOqYRtbUX5Bn XpNTfPns3oDiUrp3HMUqRkZCjxdhSCbFwerJYezX90wXZZxMd1R7zqVd3hu/u0Pj uragBJTcQpvFzpOcrI6j8CWc5tj2FFHeSGZqKdypdhPutEYL2VDEkKTQSaePzWzE rFTCbQ7Ymk4Cisi/bsaGpjCKOn8xi8ulXef8a9WR74On9gntYysG/411QUyOeeSe E+YP3eCSS6FMB343i/8avr2+77XB8d/zA2VbCT7+rnStEeXXXB9fL+xNjSzR4yNY FnfkbsMAJKeblf/2fIMVdbI76NGRvgAj6z4ojBS2nXu4MrxDhcE= =NNRo -END PGP SIGNATURE-
[SECURITY] [DLA 1746-1] drupal7 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: drupal7 Version: 7.32-1+deb8u16 CVE ID : CVE-2019-6341 It was discovered that missing input sanitising in the file module of Drupal, a fully-featured content management framework, could result in cross-site scripting. For Debian 8 "Jessie", this problem has been fixed in version 7.32-1+deb8u16. We recommend that you upgrade your drupal7 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyiHFEACgkQnUbEiOQ2 gwL8thAAgLDwlOyeLMD5lsmaJbErDZUvR+D0leuMPFMV7ijf2ZbIJp8EFs7nCP8a 4JpIeuTD5IOPqc6dspsDe+DAmLKEfpLBgdHMOkmEZ3oE2s4MEhKpAvrM9lJYhbRi UD/MI1KQ3Xi9M+XSS1/eglUZrWjbpRvGgsuCMo89r6HJD56fcIuIMCOqj6DgYK6s Lq8qVOlDMPs2PD7r/Wql/yOW2RSp3AXoijLc7xreOQ0Lb+zye5cVCrzEosQpLvAO OcgjIxilYmYtVIZn6c5abGx2QUDdAovWI3kssie8Yz0odxqsP6rAabAP2Xktwhe9 GijALQYv38aGcLVXw9+RZ5l2wBM30Utj0RwIywKuD7LYQX+nR/YaS3G5y+iEbP3c V6B07ywrWr3los2myeKtsleaLXTuWFCh4L5a9cyVddmt50sZy7D6ty67WX7uMvUD MNRSMdjG2zmjhJLt9H3lMbjtNUg1+ZZwETYrZTZ40O+JKPLeckNBETO/GaX5rveq /2YopnA09UJuBnCgHSZ4cYyhJ2dol8JyPT7iQt2v5vS3YrZHy1BzUkjydtbpZ+S3 6lldzsh+XljoH5piPCBF2fxnqaMWpZgHI3iaHjxIt4GQD5uoMlAvNTpilHXoMapr Pon+4I7WZ73Kx5gxAjI/1QJN7SKRZTvTyCdJ+VJy7v7abkviq1g= =ZWIA -END PGP SIGNATURE-
[SECURITY] [DLA 1745-1] libdatetime-timezone-perl new upstream version
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libdatetime-timezone-perl Version: 1:1.75-2+2019a This update includes the changes in tzdata 2019a for the Perl bindings. For the list of changes, see DLA-1744-1. For Debian 8 "Jessie", this problem has been fixed in version 1:1.75-2+2019a. We recommend that you upgrade your libdatetime-timezone-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyh4rIACgkQnUbEiOQ2 gwJ6hQ//TmQOkANtnQHjrtNiA/CAA/sBpbbprjpcR61UsWJ5QlpJJbi/riGLHE44 E1ZOlAVJwuwn7O9Vb7BtrZ6VPDepf7ogtyavNKYW31GNe5PJUR0HOgTKxAAxyZ4j JOy37iyDFUNxbUfco0Y0COeSh7aT6+hXwFRWVUMB3bFi0J9oAjrgxm6cyh19YwEL UtZfzx5p5FS99v0rIPL7qyJMxLpNkeN+YRiaE4mHKY47SA+0BwO1L6PKMQAchW8q DgirvnIic+RUZoDOGMhAMp82B+MwC8y1zR+balGM+ICMxBWoemJZUgBkOPZYWs3+ +cntH/WumpI4BEJwMiioSRVcaC1z2sGLXsT6zbp5iMB8YGihvSVrV2AN8+BBweyt CFmPSbL6SFaLzFGfF2bMat+VGjo8p1p3BEg4S6poDFTZhV1LmsJTBnuDVeLJs/MZ vrPhDy96nXGItQBe6HQmExjj/DMDl/mO9W+DK5WiVWCxCeDQfPfuZC+d+8HPCG7x hAXd1nzvoZrbva0/VWHuvHOJPZtcnNeQmp6Y4GD668PD8Tjfj8T53CID44BKMENo WdA6ZnOcTjj9vSFRbhfzWboNtZKJI08X8AOqwkMgzuJz22wYZNP9W3wIE423w8+c b/FQy092uwKA2Ljl7umhRkrbifahiaBL63tCfDfzluvaZjh2RX4= =vTsM -END PGP SIGNATURE-
[SECURITY] [DLA 1744-1] tzdata new upstream version
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: tzdata Version: 2019a-0+deb8u1 This update includes the changes in tzdata 2019a. Notable changes are: - Palestine started DST on 2019-03-30, instead of 2019-03-23 as previously predicted. - Metlakatla ended its observance of Pacific standard time, rejoining Alaska Time, on 2019-01-20 at 02:00. For Debian 8 "Jessie", this problem has been fixed in version 2019a-0+deb8u1. We recommend that you upgrade your tzdata packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyh4hgACgkQnUbEiOQ2 gwLS1A//S9NGbu15AdbZP2v1/NDz88iSctXm6fIF/ZCzfY8DHUcPBgTl6Z2dr9iZ dZvVgzpedcLEE61CHmuZrtX94nKZ4cioVVF4RUaDckgSFaOHnOeMuxROxlx3oEdZ GjPl8ztYaCA2mzVUPIYDOxbVNowScGmdabOR9g8tQ1HsjQBud2hFkkA9FTpElYTR 40CS3CzsuDcg1XMTJIAoSOwoVDI3HvJBhEWc1w9A5mSH5QXr7f1H7ODLA1PESxIi R9LMXjsqDss5ibtHlz0y92ucEbPXhFwvnMwkNq5gOiVoxqxyPheR2rvLksv4xxX8 81FBKkjeo+8sWp/MAUvsN1t8KyuRUrDOk1RZTDEg/96hibg2jRROtGiPcw6ErcWU ZdXZLefTx0AVkaBVZLy0lNlCW3f5E2BOwYYyO0uMteoVeh8o5RqiTlX//ijsAGK/ Ha/NslWC7e3Q3+C5Rkebxmyhj8+ZkLADo/+3NK+MRkwaIR90BppDS4tkNlK9D4J0 EXEbpKQlVmPVsy7lXxv+9dYKqEHGcvSb5Ux5+0aNBgIca+HRoH2n5KT7XCGOnEZa 4CqxzmM2rD9idIKfo/z3KFGgFaTPe/ejT212mxZvNUHk77i4n3GW21FiDYpxz3el qkmMjBuFIs2Y7PyI/kYuAYJhV4cHPfNYa8y7ZdkdTeBXuhcUK7E= =Osgt -END PGP SIGNATURE-
[SECURITY] [DLA 1743-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.6.1-1~deb8u1 CVE ID : CVE-2018-18506 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9795 CVE-2019-9796 Multiple security issues have been found in the Thunderbird mail client, which could lead to the execution of arbitrary code or denial of service. For Debian 8 "Jessie", these problems have been fixed in version 1:60.6.1-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyh09kACgkQnUbEiOQ2 gwIO9g/+O8pnr6WWawgqZXC+6FRPBYYUzucv+39whdKcydeXX2GWrKFuWdh+fjXf WK0syZfLeQsyTjUDZ0l9ssunZquwFTV78YF6S6eck+uQPjcnfIB7NV7/5wkI7zV3 TNiZQZXobp4frApJNiw2OanuwXN8WqT5sRaFb+lniUvRmQ1Dt4dX/OGSmXNcLCh4 6hulQk3w4JdpVLBuOTFwDN+aXDZlCyILjoRTQMhF+4UUWSWGzcc8fjnp6e7jpew5 qeWyKYT00bGTINfSk8fWDoDTdhkHgKB6Jzs2vUdxi56aAPHtNxvJuOIZ2Tzm3aFx 0zvAKnM10v+jB1a5/YznTVbctbKCrRN3HgZph01VlE9ij8j7EusNFbqIbop7TmNB VZiUoKCSgLwWfaw8RMUBbdWvSv0jJ1SJ3lgOaIVGGiW9RZqP6FdcU88jNydpbpdN xonZA6t7SGgJWsdbctLXq88nUyoZuME2rbYNof7rph+Zp9IqsEPPahIOIwkc4dEy 7mJCKYjudxbu4c5/acrsZLzLTN8mvXpoIWnluJURL4vfUh18EmAxzT65sgMq3tL1 ++FYEox7aSJop6U9/wYIdEOTAOyzSeuIH6ekooDuZYsuNqBvgK2agnKfGZdRKO4M RSSMz4dffbRiHcsdIR72cZv9+tH5qtCSoxLjmHoP9OJ45a+h2uQ= =5vQG -END PGP SIGNATURE-
[SECURITY] [DLA 1732-1] openjdk-7 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: openjdk-7 Version: 7u211-2.6.17-1~deb8u1 CVE ID : CVE-2019-2422 A memory disclosure vulnerability was discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in information disclosure or bypass of sandbox restrictions. For Debian 8 "Jessie", this problem has been fixed in version 7u211-2.6.17-1~deb8u1. We recommend that you upgrade your openjdk-7 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlybRUIACgkQnUbEiOQ2 gwIX+Q/+LS0Jag8PGk1Hy8RnxorE93hi2fGOjD8u74ZID4KRfMNd/81yK4Uhg/+B H744T1mY029DcIsB8yYx5hLYD0M/Ijh/sIGq5r2kANoyIMRVk5L+A9UpX5fWwx8r h3tGUrQt9gPKS7sG5TjEpcdl4fuQ4tRbqsV2lpzLC92dtJOnusv4oR2YfWhqKIBn TrWPOxctTgMMpPGJTiJiMoFAQcmDHEv4iID3kx+TT+H8aceuj+NnOaWtVo7JAyDi MZFDXtPZBauHzG/SiLMJNFAtQhdnTIRJdt94dy6t9L0BrZd3xvXqDTUD7Qyhm9t8 mA3XjIKBD5mFjBh89SZShb85pnjMk/JrWAsaSAJYrSAt5BwJImyEylwE3by7XFir 3vcGCjnhJvex6fMHgZc5jMUh1ftoXU757cdgXwU/m4B2wYDKYv3gkhtbXgQoNOK9 f4k1hYUxziOCnACtTyHFjYhp5ko/y15ZRD85uDd+9z8RM4kHQKMcI2dNvaZZ07DD 0s+iMKRtZ24U8Ia0iDctxU/5mALcSDOf/sNUoxajLWef+dMPxuGpgPnOM6CHg2Zb lgvFMpcnPLSHGBBFBo+cNMjMIA5+d1kvNIon5xEQNtrB07qiCzEy2KQsQZlpU/kU A9/Ny7tjhqB8OMMxI//uDdzYVSgGopqxqnGEg434NHN9mMx5+Ng= =+5k3 -END PGP SIGNATURE-
[SECURITY] [DLA 1726-1] bash security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: bash Version: 4.3-11+deb8u2 CVE ID : CVE-2016-9401 CVE-2019-9924 Two issues have been fixed in bash, the GNU Bourne-Again Shell: CVE-2016-9401 The popd builtin segfaulted when called with negative out of range offsets. CVE-2019-9924 Sylvain Beucler discovered that it was possible to call commands that contained a slash when in restricted mode (rbash) by adding them to the BASH_CMDS array. For Debian 8 "Jessie", these problems have been fixed in version 4.3-11+deb8u2. We recommend that you upgrade your bash packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyYwccACgkQnUbEiOQ2 gwJ00xAAha7Q/3rsy3EwilgHyJwnV5PkXBQ8EAgI1KQ6EuqWWLsDykSQ2zmG79dC DQDK1Re0ikpZJy8x70GwW+Nf61s6bJFMLRrxApnKcn80339qXEjMdgoHsHP5qIfm dPxKk8ulR+Ppdcq/Kjhu90wT0+v7k4XusucB6SAZBmUdAL4qns93AN4svjbSlsrb Nr5QM1mzc4d3rNXTCn2Ek5u2bMipHge5tJlmncWljOInvGXMTFsOozcL1A9V3+Wc l7o3dvF4bEnho/A1mRDUvdnPVrFmUfBJrIuSoTOvInLd2ebS1+Uijt4a+dxWudZX M1X9OERN3+uVCnLz/2AhVsmfO/AfRI8Vt0RL7dvAQKPWUmZqNDIKK7O8A6bh7tt2 5Fn+1SALP6TF/Rtb5E5fI90zIydsJDiNIBL2TyGsrL+w+kCxmhsj7BEnID6iC50/ GkpmT2IWx8etOHNag8DxImFwNLj1doDueXxp+nz8guhK2WV6ey+i1iYxbU9ow9kH Y5AlCD5pcPRezj0YEfSuDzvPlJ0qDEaT0mINPdChktaOYzGFzCw+Ufx7TgRm/mXX tdGjOnzo1J/GWMBK4D7Ztf7wzWmeInNA4vy0t0s859vhHgF+cdEs4al7MUWH/sZd Qs6EdrkWxBOyzEZLoOl59Fhn7i7KLSf/1cQlW1lNTzV/MGSRFGM= =qNdv -END PGP SIGNATURE-
[SECURITY] [DLA 1724-1] ntfs-3g security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: ntfs-3g Version: 1:2014.2.15AR.2-1+deb8u4 CVE ID : CVE-2019-9755 A heap-based buffer overflow was discovered in NTFS-3G, a read-write NTFS driver for FUSE. A local user can take advantage of this flaw for local root privilege escalation. For Debian 8 "Jessie", this problem has been fixed in version 1:2014.2.15AR.2-1+deb8u4. We recommend that you upgrade your ntfs-3g packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyU+NEACgkQnUbEiOQ2 gwLxdQ/+K1rZ9xBdzrfbAAGeooLCL1+fBCjlY3I1lA6vWcLEL+WiMJA0TTIoy+XI fHn6zUCmWoNwXqO4NM1HkBzHUFWWY0ryW3oxcxKpF38jfKQ+TwjwPkhcz/cIytnq UynmZDvo3AG+asliLSa8dAn3ui/P2NReZiR4GCL7u9SRgp5JF+SHzAII/RoHCu5w 4KBxC51UA8cqe2ZK+kqM5hERY6ZBh53Mp7y8TCOfQ+DsQdJoQM3qYUzjISH4KIXG BSuXnW/Iey+/ybi7yhBVd/VQULRcmeHCJM6YAnxNgmTSsPVQd4Uf+AvFLntAqJ4i kgfAYHgPN/xv7ZCNwQKvE9i/Wd8o7IuaDsqI2HooqlD+S3vpf6sQxOSkKlZ2ZyKt +jN6kLHUBxUoUdu/8VOdYqJGgcGB1EFeIgreCnZ5SRT6nk4oXPov7/J+gDQn+Cfw bPOtdaB3iEi4caL8DWHWRvYTLQNdRMsyymzbIzr3UzwtEd99cLrtBNIxpeENTYtw /Efq6bbBj9efvFxbynAp9GtBA+sttbQraGHtEgstOrDV6X+qmQkUSuKTjsEvCrIj i8F61i9/ruVRYFZ9U6n4zQwyM67rS/ziWuKtey4LUEMnMkldAJxzXIkaPYI4edwj nJAugJ3N7rSRHkeqZJGxJYooeLJRBS8sq53uU/TRHopna0IL9RA= =56cb -END PGP SIGNATURE-
[SECURITY] [DLA 1722-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.6.0esr-1~deb8u1 CVE ID : CVE-2018-18506 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9795 CVE-2019-9796 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 60.6.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyTdxsACgkQnUbEiOQ2 gwIV3w//TOif8ZAh2jaaasAn/iLtXHGMCFNRF8ew/gdcqm+nnKOYWKSHOXqqeRe3 UyZRbGQI/t2qmP3sSjM2fXN1HOMTalc6uRnFSkfuUT/H03BOTWoX0rQaUznX6w6G bxC9I/AxqciuBEGZv56YYNanTyhnqpgF90WkQ3KAvnrcjccgq51h4U8e2g3l4imy Pjdhu4ZhHgg4fvlWjWxexSyCClF6yuqeniR92fs2gmtfUQo5R966PEVvHtgZWj6j vMV6xwfhwCsLRb/qD56hD0Dg+76n46wrVmqqWyvkcxvnd3DULBpvMUqgsI/W7DOj KOIchWkgaWMu9DHtUtb/kNFQPNWOKxc2sLg12lGDsNMuflyyZ9WU2zzp4KM6U7Oy NrdGHP4q5Jp2vaCUF9+hYaZPTlKoOJln2WI2+xyVrL0aSbaBaUxWNdxpsgjbpbaO kiC8JetPDWEr+SuLMspdo4ZWM+0WaxY/gTDmH3ewAcMRHIibPMyRUVLrB4YVKIWp 5Ae4d9AQhgOhSWg1e51fTTfX/gD2CeQWPOdvFwAVQ464+kQbMDkRcpBPpNCa+nvW RRzvwBVhptRr7TF3kSWybXJWHRuoXhUymepwgQYvbpxuOvhoRfRKlcrNM/1QMu69 NhssW3g18RERoz+cGbaJr8ELRkV0ZCvwtJSCV8sHkUmqaKRtCb0= =oKor -END PGP SIGNATURE-
[SECURITY] [DLA 1712-1] libsndfile security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libsndfile Version: 1.0.25-9.1+deb8u4 CVE ID : CVE-2019-3832 It was found that the fix for CVE-2018-19758 was incomplete. That has been addressed in this update. The description for CVE-2018-19758 follows: A heap-buffer-overflow vulnerability was discovered in libsndfile, the library for reading and writing files containing sampled sound. This flaw might be triggered by remote attackers to cause denial of service (out of bounds read and application crash). For Debian 8 "Jessie", this problem has been fixed in version 1.0.25-9.1+deb8u4. We recommend that you upgrade your libsndfile packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlyI/X4ACgkQnUbEiOQ2 gwLyHQ//WB9Vd6+C3BR1Cfx29xUmeLx4GiXjGLZdcEVotH6sRsgG6DQKfQenqDMi sgRPwO3/4AlEl3LI7RBsPApc6jY38G4rMa1csIh8iVcrJkM6lGY5xiHHd1uBRZRw OoboMQiVTDv0skJtnHVg8ZOta1hafE0lgMAXW7PW/iLNiQIBs3lKKAd87tsXDLXn JcYPrNwXeMe6mzZ7JZ+zl/pVWmQfnMw/IYyRUbD8iOQBrbRQE38UTIHRdVRwS1Op fwpYAeWeMvZNsk7Iaj38YMR6xKgn0k5qHVoSDgetw+tS5v4Kx5KfPTiq3ZzbIhFU 8onySMKPO5k9LVfDijODek/bAjCHO7E1F9W7WvU4ZesCmXZmGMI29xl3K98zh5RK E7IR6UzlJSWVd+G0IPAE917q0+16tNXnppiuoUZLmQj1AdZPnEHU4vNvRkHXZ0Zh aerGDqrZ/3+SuLZKaC6Zc4d6oDsE+eFl8z1tZLdOE7iI701o5O91uhp8QB54OvzA mMu1WitpWfhWEhO6D17x7GPsuu6NIukBgW4V5HZxDBsZ7eat7RYfGMh6LyM6uQNV MqK/xf+OHk2Hj2H0B5bcxsInWL0nyDbqdJXwxLbt3X+Kwx0OxHUw1bi7G+jVRHHg sX0ehGo1KZR9RGAs/F/CeGvJ9q3v+QHvh6/W/rFiMbbCHqpeB/g= =HiS7 -END PGP SIGNATURE-
[SECURITY] [DLA 1684-1] systemd security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: systemd Version: 215-17+deb8u10 CVE ID : CVE-2019-6454 Chris Coulson discovered a flaw in systemd leading to denial of service. An unprivileged user could take advantage of this issue to crash PID1 by sending a specially crafted D-Bus message on the system bus. For Debian 8 "Jessie", this problem has been fixed in version 215-17+deb8u10. We recommend that you upgrade your systemd packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxsWMoACgkQnUbEiOQ2 gwL9Rg//WDV2Yuj7f46NSXH7FSAlxPLi7gldKTCoSF1J0/Yt9wIKLslgXu3zh2ah 7CCpbwra4yXeXy/kBW+yRuIBNTZH6FPE4o+FVR/ulHAy9qRGFvaHdxdsemSbVevp cGlXlG0CLsL0GJKvDN6u9gZZLugMcuQroMrNRSESE2vF9Wo5dZybIMtiv8xi/cn0 06EnGZIyxiINhGLeS36ng0qlWgu9dg5/OkdPzeT+wlLJ4aVtz1wCzW1lE9zqABbh NMV3dK99Afssun5UYRu4AlOBnjnVoPKKenWnelH646WyuKi3KxHQGWoanNA139uX 1x31IkJ+wyaawPug7mYH5TmL8YCMBx4vI6Nrrc+EEGYZNW1d/hG54ismPuN+ZV6D DEoIXS+3dGdL8Wmw3afUW/p4yDyle5Sil+D+dq3678kJve8YjqZvV5MnPfjppsw7 CgpqPwwYHDkWWanmmCrQPNjN5DsklAq+NGyP+Hh4nbfHN/ejKz3t3wJn3DIcxbdm Q+hKsKkIfMeaxc+6OSmFIUELvB+fqQlCTYCnTSFr0JcAPrwGUewLo006fSQNJ88k HzFbmDHxHZNBLbglXJMRRufr73O5nJODUeHyruG+ZnlJU4XAAKeoyURAX/rAEZ+2 j48u6jI0PJen0gYgpPFsleutpwjkbHECCpv6zvGkByBlh//9NTs= =yZ30 -END PGP SIGNATURE-
[SECURITY] [DLA 1683-1] rdesktop security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: rdesktop Version: 1.8.4-0+deb8u1 CVE ID : CVE-2018-8791 CVE-2018-8792 CVE-2018-8793 CVE-2018-8794 CVE-2018-8795 CVE-2018-8796 CVE-2018-8797 CVE-2018-8798 CVE-2018-8799 CVE-2018-8800 CVE-2018-20174 CVE-2018-20175 CVE-2018-20176 CVE-2018-20177 CVE-2018-20178 CVE-2018-20179 CVE-2018-20180 CVE-2018-20181 CVE-2018-20182 Multiple security issues were found in the rdesktop RDP client, which could result in denial of service, information disclosure and the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 1.8.4-0+deb8u1. We recommend that you upgrade your rdesktop packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxr3PEACgkQnUbEiOQ2 gwL88w/+NQ0SVpQO8aATxWTlPXxUyNdG8YCiabHdRmzMFpvl81JwbDubtt4TZ+MD ownJZX9kpiAdfTiGbN6n66faXAW6u+bXeeZTQy/N8ah42lIYc808rZi/44i20zLS tcunfyWvBPcnp5csFABNTW8z6dihxWHIONsdy3FUqidc1zNYQyqs1E5svm649uO4 SuzSPey2xJGCo8nhZXQL4AUDiRNxi4aq6BVsf0+4w1WszVR3+3ViMjITvOKmRLVL IGNujLW9JHPr+cUvyBvb77lYibnVHUq2nU4zACDADejtOcB728SJew4xltSCvvaR rLPd6zXjqnN4IXbjstJ1NvyDcLzXxgnnrvUD95HIxWPjB19Tut077Iy1QS128Gqr iUmiySd4gOvViHxwZS9qsfQ2IkkWxjD9U6ix+0Z3mywYIUo/IJ9NB+sdGBi70Eo2 9s6biaTyMggKTT01ppp6vKbR1qU/75K9Veo3MKxcirfOsXzy9YBDqXxevUtNisw3 0CBKkHcJnRDO5nslGJc3D9rvuvd5gooEzRmuE8Ofol4FNQrdKMGHUpuybFvvsUwn DZwJunMswx25OZuqSatt8Eirr/YbB+rLAM8Ca1jPY8tI2thfAyH1SEV7XRpFy//h i95vTp6Lol123KkW/+RLDlOLAuym/worI1MTVB/2mgGgBpX1H54= =AL7b -END PGP SIGNATURE-
[SECURITY] [DLA 1678-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.5.1-1~deb8u1 CVE ID : CVE-2018-18356 CVE-2018-18500 CVE-2018-18501 CVE-2018-18505. CVE-2018-18509 CVE-2019-5785 Multiple security issues have been found in the Thunderbird mail client, which could lead to the execution of arbitrary code, denial of service or spoofing of S/MIME signatures. For Debian 8 "Jessie", these problems have been fixed in version 1:60.5.1-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxoXaoACgkQnUbEiOQ2 gwK/aRAAkOM9szWovA4AXiuDhqsKacxNNHPW/epAx9MZg9nhmSsd6H5n19rsasbK K6pJmIa5UziDr1XwXSCPjjSI5c0sPrNbJtEYCQDA2PSIE3NDyPwKhoBKg4z9HSzG +1QS/G4EcVYblA38WBv0hXlgI5Ldd7/5cs8sVHcqVRlaHIWhTYlTQxuKucIVddgZ WglOnsoYjpBoPuUiCyNdbC7Fsqqi1GOgPn+DUus9NKIsxUtmrEGl1UVo+4SQaqsd 4DFjgr7TvpCWBr4tEEK84nwbTkjbe8AFZRhSrkLO9hNXAm3Qi0GxC1FA4KUlrFz+ aaMfEuyDb0xpMOvhMjqvPa3mgcSxQlz7819ypV2NumsXJcHm5SLIZXuahKfzyUgK 26czPYOmlIQM1JZu10MNX8L1pWmotcfhmt04Wv3M7Vgk9H0h7xVRv2i0HSEoTere 4abLn87I5YkXAU8kit+POu9DnUK6RErnoIxWK9xv8HR83PnVbfwavLmfuHzLEVdI ZNlx8Xfe3ppSBLVA0szAF98ySDfmXBDnTc4zXj/W/4TgifQIMdtyf1+Enf8q/LBF AASWxDiR5x4oxj/Zn2eDNJECP/kxXEyKeCVFkAN1gikf3rfqjPldZ7b0XaQRkt9y SNoltAV6TzMQuiAj+8tkyiHObX+QsH0eW47Xq0doN2lcTTTRSPE= =8CA8 -END PGP SIGNATURE-
[SECURITY] [DLA 1677-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.5.1esr-1~deb8u1 CVE ID : CVE-2018-18356 CVE-2019-5785 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 60.5.1esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxmrVoACgkQnUbEiOQ2 gwLeaQ//en7NRTKHTojr2D+YSpitnUEmBWfuuPROQ/Y9KwLQ16c7103fzqmz7aVN J35qT37a4zxZ2zPmha3sFh/IEZdshVV64imVvxG7xiXhmUSvet1BY/1qRHNT1gCS qXp30mYpyPWAP2nx2y2OUUr+DQE/uPBw8PyeFWWT//wMIFDitl0U+eyzdQDBsjjs m9kbp7uIZPr8xJoRpyZvRqGUhukGLnrDUhQF7FuKiafu/BELUDyOVMZdyOpDelwA erZbmkmm7GWWsH7yaeiDH9Sw+SSGFCF/D1wWx2AdRmX/EcR2O3ib87ug0zdQBhIt P7UIcnki/cDi9jV3NOrA2hVpGd9qMryie+rnnYKOwzwVpPV1aMZyppEKBH7k+pMc 4ODgVLh5fRXnvFmhduXc1oRg740Uk/ZhczVptWQtX9pu1LtIzY60Bc+GFgCpLVs1 PNT8KE5Wa+MJvwIukTUSeMsTo64djL5S1lWfUW0lvc+WSVxepeo6mz9ge7dC/wR1 IXGQte1iDS0K+DwHnbkQj8LWnKFDCyCijnG40mr3wO706KXvURkxbXpiUh4ikitE qmYrGPK0WSvXAYHz9f/W8nyiC/3Qixd24FGuZU0w7DOd8zWbRGv9gvc1WELZ7g1l Goua/+1e75n69hNIQmtXa3dZ5LRP9wf3lgbhKz4aXY7KBoWJjoM= =z2eQ -END PGP SIGNATURE-
[SECURITY] [DLA 1670-1] ghostscript security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: ghostscript Version: 9.26a~dfsg-0+deb8u1 CVE ID : CVE-2019-6116 Tavis Ormandy discovered a vulnerability in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service or the execution of arbitrary code if a malformed Postscript file is processed (despite the -dSAFER sandbox being enabled). For Debian 8 "Jessie", this problem has been fixed in version 9.26a~dfsg-0+deb8u1. We recommend that you upgrade your ghostscript packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxhOPcACgkQnUbEiOQ2 gwI9OQ/+IZ1ind4UeMXs1nlTahELEdQAzKOgtsPn51gl+2HW+PNIyYn0Offf4sHF ck1TSwcl9F2OqEev6WHrPtxBVHXk64Xny3NN8DC/D4YddP3beemvS7lvtyXhQ5ob G//D923qj4OSDfBjmIy3NQwnYgPpqKgFBFZ+gdPR6uZuOuHTu87MwE+BhqkJXZPN yvwHl1lToPpueXrxuSV7KsO8D50Qu4lhu05bY4ifz6156aDC/JKprC8h3In7u2ct NNd/OkKfwg4flpYk0wfxSmeWbxDc06ruaSpkZOYy9SxvqcfEFlk/pEePzxRwuNpl SoscFTU0RAWWS+9JXRT+vavITZvypWTmIuaKtTL2m+KdEWYgEPH7HL73Vo+u/zgs fT+SRn2KBpfB8JQJNuZnddBNj4w3f2E55JiW008iJBBvOVvyyo27Y9NG5W3mRV7a 3g9zRWZJ9dPDGrhQIHowMrx6cVxags7UhaVwn5CVAqtw3S87VrrD+1Y4TC8Q6L96 BFcsvGSo7l3cXFJ7/ulk0Lg3FC9t3RF+Rnkwl88Nx3vMD8vtXMwv5LRH8r8pFjzw SxLLqFio66mG2+uNejNuCUk6YW9vFJFeP128YZOlMuamWrSug6Nq3E54/wMwNhjx op7j77VZWvROc5NRduLGEXRJiQPHDqASd04aWXYM6fx24Mj7Fkw= =onkV -END PGP SIGNATURE-
[SECURITY] [DLA 1655-1] mariadb-10.0 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: mariadb-10.0 Version: 10.0.38-0+deb8u1 CVE ID : CVE-2019-2529 CVE-2019-2537 Several issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.38. Please see the MariaDB 10.0 Release Notes for further details: https://mariadb.com/kb/en/mariadb/mariadb-10038-release-notes/ For Debian 8 "Jessie", these problems have been fixed in version 10.0.38-0+deb8u1. We recommend that you upgrade your mariadb-10.0 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxUAykACgkQnUbEiOQ2 gwJDvA/9FCwWJpYtL9HPbJHGI4vp5EDxznNb8dSQubKXP10PP87ty7/2IA0RrvwE jySuVooRSF3KVj9LtGuys/Hsd9yb5An7nFVaTdvysH05F1uMVd1w6DhORVrY0vEE 6b/ZQpEeyVdITXkS9Q9eiG8WRnrdSsUv2sNY4FnQDUByuNgX304biKveOzRFKg2K n1zKx9c2/4tp7tT/gdfgNKmfYWDviXElq3vGhapBJG15ES+q4oGN2jvmAwvt24wf ZUya/VFUgoAibgEB0ruasKj8oV0o0QfFoTkHi3+Pm/ublZrVehZP2yOXr40wqMSf i0skKkBqxm/ekmCzJBt//BVh/rfftoiADFazDQYaMMkCe9kqAJQurOSXXmkz+o8E c7ULhmxQYeS0l4WbYsi4TXxYUq7kRcERBJ15/Ts5EJjr8dpxVpP7y10mrtdwnsTj uRz3gEL+74WP2ksLg+NwbwpmkaGHuqkDhXsz33fE0C3UWvLhhOX5EEv0OwBYVWTh OFbo9mTsC+atIYO0JFBAPbdMqPCmeVsgAN/op7D+G4TJNFSE+acp9uw+rAt1UOjt XTRhYG8MbiYpug0Dd1aTqwXyC3U9FjHkz8TcqoB2rGeulUmsmLaYNwmaaSJtfAlN MU7gXYUvw3ybMIeEpE7oRefJ+VQOgHSEcyrxJQfteKDuxC2OT5o= =Flsk -END PGP SIGNATURE-
[SECURITY] [DLA 1653-1] postgis security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: postgis Version: 2.1.4+dfsg-3+deb8u1 CVE ID : CVE-2017-18359 It was found that the function ST_AsX3D in PostGIS, a module that adds spatial objects to the PostgreSQL object-relational database, did not handle empty values properly, allowing malicious users to cause denial of service or possibly other unspecified behaviour. For Debian 8 "Jessie", this problem has been fixed in version 2.1.4+dfsg-3+deb8u1. We recommend that you upgrade your postgis packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxTQScACgkQnUbEiOQ2 gwJzcxAAnMS9Lq/M2vU3GfSO0WPqLZayL5A/772xLDdUKRHGBeMnkt/ZArS5keK+ AGok/rrhlEQBQLCgWsYFpdL/dQoPbYiNBrxKGSnDpw5oBkL5hUHyMQxZWc9JFFA5 o3qypOEzKOYgWmYmwT9be4MraAYQ+q9/UhHlTpTOqx2GPEEVnuAZ+80ImsyJ8To2 kuATuPowTSmE+MDdIlkR7xV89KkA7NY9ZAZ3JBboESiLYg3o8bXVQNtPrlBogGB7 AyUukdx7PPN8XPvRPvFwKr9+uQr4vDJRusLDyK8C60mvt8ONXx0TVIOeHXBfijqR 6kf38a6LAffMtEYJFztnoZL/xemUjTNFSUgy6I40DD1MC7MYEXJzF5XUk80v73R1 YxmJdht0W3bDbRy7KsUVtYWKExL+2GCPapbZZ3iMOmCma1Q9jvOqdTV1BOHfoINy AUIEG+jPGhyDaTAETkcUAVKPZr6BrIm9ifplxJ4RVpQLLCnwr5Zrrt8H93bk9o/h X1F0YP3wkb51Kbo1/CPKhuWxSgR90hEyxRisajshFbcvVy1E3NYThpiU5QNQyFiM jQCn/tX0ezK+ZF/GsH3jR3EyYMcNeVpYSt/YedAp0QzSzAP1tYXuJsG8K/AEunhp EmX8NwraNI5kIoVuVM1EZg3Gk7Hv2xXKal5ROdZU6OPrZXiA3HQ= =LiQQ -END PGP SIGNATURE-
[SECURITY] [DLA 1652-1] libvncserver security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libvncserver Version: 0.9.9+dfsg2-6.1+deb8u5 CVE ID : CVE-2018-15126 CVE-2018-20748 CVE-2018-20749 CVE-2018-20750 A vulnerability was found by Kaspersky Lab in libvncserver, a C library to implement VNC server/client functionalities. In addition, some of the vulnerabilities addressed in DLA 1617-1 were found to have incomplete fixes, and have been addressed in this update. CVE-2018-15126 An attacker can cause denial of service or remote code execution via a heap use-after-free issue in the tightvnc-filetransfer extension. CVE-2018-20748 CVE-2018-20749 CVE-2018-20750 Some of the out of bound heap write fixes for CVE-2018-20019 and CVE-2018-15127 were incomplete. These CVEs address those issues. For Debian 8 "Jessie", these problems have been fixed in version 0.9.9+dfsg2-6.1+deb8u5. We recommend that you upgrade your libvncserver packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxTCM0ACgkQnUbEiOQ2 gwJP1A//Tp4+3c+CrteN1xP+FrgpM+Va9i5hKfD2MroA5BeWltYf5QPVomdJzdAg ZTV2Q3jz+0bn+FwrDcXhBkAyJo1Axfj2U9fcCaHVs0ncZj/wTs9kYqt7ltqmP01q JkdKZXbfdMjRB1WsU9zQ6KApUMoTRWvaUmC1UNjWNnAsivBmbv9WEm0o3x0en9nF 3oZUeJrl1BX93PGy1niH6AA3sa5KTca9MgXrefxU/U24bmTshwNs4oAPGZIJIxYJ B/TB9UGwCf4704aQYJMmf7BanrnZ42dkjmrBcRbHoPuVZ4fPX4dsCrmHUPMRHkj9 fKV3jC/gfTm8n7kYJLyO0M6Bq6rOZr+VAf9nnxsryMDKr4XPIRonI7rkkwanAXNW qQ3OYkSvusEyU1GHjZh5MKLgw1oSjObqT/Hjd8rcl+O23IZrliZ0PGTU5wRxf8pZ WJs0Oh8xWT3RsVOVQ1/NpivPfYWa3rYwRKKMHACDkyUdGs0Sk8gqn8ItSaOe2cdi wBnnTyx5/C4zGetk1jbsPkSl6JNM9oHcVfll7BN3teq5hOrf1CtNZKBQKBhzuwS0 ja9m439cZJE0Su72ehFPdq6iaT+aOnFiCIQthHt1nR5hdZ4cLaj9j6UzFLtM30nS xIkvfpC0qysCnlJC4uMHDOjms/CpEik4tK5kFSl1VdQ+u91wPOI= =T7CP -END PGP SIGNATURE-
[SECURITY] [DLA 1649-1] spice security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: spice Version: 0.12.5-1+deb8u7 CVE ID : CVE-2019-3813 Debian Bug : 920762 Christophe Fergeau discovered an out-of-bounds read vulnerability in spice, a SPICE protocol client and server library, which might result in denial of service (spice server crash), or possibly, execution of arbitrary code. For Debian 8 "Jessie", this problem has been fixed in version 0.12.5-1+deb8u7. We recommend that you upgrade your spice packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxR0KMACgkQnUbEiOQ2 gwIcvQ/8CTN3oXVpYlP4S3M5RDw6hODVs4mVybrfhtejODuDx0GxMjg2Iv9m8jv0 KjIIaiTKc9cDFeRoc0mi5vA4ZBqCY98OFX7BQfNBhEdVbaAUjxeTCXR6Mddg2VwZ Zg9YfVWACCovmcDszmzGzheD7a/x3aWTZlZuwiTC2+aORqWHGsWQhrsovM1aSDoQ VXrAvuuzrtFks3FoYG2Y8RqBT9FZsUfBq4BVBtN7WJm7xsEebFxjhQEgb37vNhFB 9qQtHJ0L6mstkY9Dmb+jLz2iPh0qn1Lxin67P8FOnRGfEYgYmKjqhxDyl2W3TFiX TCksBGdz+Xyfw8fV+thMFKJmUZwfmv550mqD4yKItrxztS06Bi0S3PHU1PMLRhSq VRZzCTY4is672amqPYMuwpQpa4DlpVh6S30enH8IyD0LPwZJqyi+kwgLUJe0OcT+ 2qGGcRpwTAffL/rFlznUBhCQdDYfOCvCoJ+om4E5+rnxFKJrRrXPaNAC5rDzRi7B cjH/JaMx1GEUxGIXx5YCKVXbsGxMvYIiqN8Q3hPed6wDv0iY3uTi77NPsYz8igWk RqWblmYba8NFsfpYPGIRn04Djk1YUsvmMPo0MzrMGBtX5i8Pr5ox28mo7xrQ7ZZV TNqYKCrMYafOsBLrSnjhpKgfvALrnuVHzweVFByvHPfY2QkoaCI= =u/JL -END PGP SIGNATURE-
[SECURITY] [DLA 1648-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.5.0esr-1~deb8u1 CVE ID : CVE-2018-18500 CVE-2018-18501 CVE-2018-18505 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or privilege escalation. For Debian 8 "Jessie", these problems have been fixed in version 60.5.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxRz6sACgkQnUbEiOQ2 gwJ2ZRAAou1WfhL+oguez7MhYY6bKoBKxu1hWf2nbHX9k3l43eV/IuW5Y219+Bxq 9Fx2HS8ljIGkwIFan9hyIZVPJWJQFLvHLtO08a/eXA5HPTXBgl4ElNnVKtDYS6wb JU+sP9ELTuVFoZjRG0qhty4wil4FKpq+tSxpP5zNxd06K9U+uuI6hpErnSJmkr+v 3ncDWNtQDqpwjYib0KuV+mf/jRO1v9aGJWjepqlKqR9vXr/ZnnwGpAzpnL58wNA8 lHRBIVO2eVCysx53qPmDuO+rqXV2InkR/fJOf11PK2ejcb6iGlCIzXHWeTWhLWWQ rSTezod6r2nifn6hQELPaTVsD18q4G98qN4x/e90gDHPrkckIpqmCoikH6Y4Cp6y qCy+BsLVLfA9nitWCNpLgtd1iFuTKenDSUPTbonmzjNuKFTx82f9g2DNLMDBKFFc Fm+yiUOtQ4vr9fZONLNwnJBOI+GEbqJ9nwXxNeSScQyirYuZw+Y6rPSkCtCOgzd2 cGzILhowwjf7FAXqKjjA/8sPM+6UPOjJzlss9JoCMR6yfpMawLpe7UYjih77jsex zH2S091wu2KX8PMJnGZCkxFjCRrzb48Er9aXT3i+gAc0whADVuEc8Ya6SGfSx/5Q dx9P1qwb7GqzGNebNj4+C6fIjynELFFRtWeW5D2II9+Jy1nC9LM= =GVnC -END PGP SIGNATURE-
[SECURITY] [DLA 1644-1] policykit-1 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: policykit-1 Version: 0.105-15~deb8u4 CVE ID : CVE-2018-19788 CVE-2019-6133 Two vulnerabilities were found in Policykit, a framework for managing administrative policies and privileges: CVE-2018-19788 It was discovered that incorrect processing of very high UIDs in Policykit could result in authentication bypass. CVE-2019-6133 Jann Horn of Google found that Policykit doesn't properly check if a process is already authenticated, which can lead to an authentication reuse by a different user. For Debian 8 "Jessie", these problems have been fixed in version 0.105-15~deb8u4. We recommend that you upgrade your policykit-1 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlxO/fwACgkQnUbEiOQ2 gwJcUg//fmu03pDkHkhW6dXIDiMsdBhP/17aVNQqgo+SRUKeHVE4WG1V4pP34cs6 gYyk38oS6NOIEZ2gs0uOeXmvupuFnf56bhIX4ZN2ndRoLep1pC2e3nHbmrG1Ivrd v16EkxCqerOjSizPlo03MzzgJg3e0745o1StObNEdbk2PHJ8rahc7D9ZaaGO/2Zq apoP0byB6unsnTTW6UVke4ou1c/OY1B7E7ZGtbdPEcZyheM89m5Hu2GODb7xqwIx GRSFa7s56ulKLfiDaFW5P0+PSg0RGqZm8W/kxOK+Ku4Q6LF352K7rOSWBHF+z0pz JUDmZbcZ570VmyfFy7pwRkO2RSr78WI4BIfIlBEMvw0fPzgRbVPegcbF9aJVJU+r PjRK05P3fLC6odl7aAupSv4M/SN/K+nxw0rUr95JHa/XQTfx7djHDhh7WodpI1bt fNCyr1Lew7A3351GJU5Y4vcrs/GGyHSS6yL/+x+kD4jKFGYw7vCYFEWL+m1pHg3Y jcTyvRopkuffZ7wv7nWPbyaf3uOYr1qb9DFqS+HkmV2qMIxdkO5wbE9+jvie6Gsu q8neH1Q5gGpRDq3C6nkWHlDnIAuS7tQEnnBpRhu0lPaYSO5CECH6d/NaFQw0Dyal abwI1rSiOeDOWReoSF62Fy+hIIY4GV1pinaV+hSHjyj/Wydw4/I= =APCW -END PGP SIGNATURE-
[SECURITY] [DLA 1626-1] libdatetime-timezone-perl new upstream version
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libdatetime-timezone-perl Version: 1:1.75-2+2018i This update includes the changes in tzdata 2018i for the Perl bindings. For the list of changes, see DLA-1625-1. For Debian 8 "Jessie", this problem has been fixed in version 1:1.75-2+2018i. We recommend that you upgrade your libdatetime-timezone-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlws9RsACgkQnUbEiOQ2 gwLmSg//bKrSJxibPV0DdMoT+WYXuWcyabNFiTJ+QphaTRqFURQ6wl9O0jAJj9Bm yl9vpHOjMH8syLSkynoU2mnKCuxXxWJAzw6vC1WoYFYUgEUhaVgb0KhjF/aBvUNn kS5HhyG6yuheHFKOdSu5VTOTpSzLxQeBw+PiVQDIYd4jnNxG97JK/1DVFsX1fW4D YzF8bVt5e/SKjZFNW/8uS1vCE9x+7W3UJvJQ4aqg4NcV9WLkM5FkfQxpdMvYz9w6 8iSQ8nhIj4WysvazMfv8Z0rS6p9wJDXRD6SdPdz9EZy2UBOXL9N9uMXvYjzxMBlJ jnAnS1BxUyn2ak9NoKXHQQ0Q5xFneeVaaOMB13nOrcfGbS+s8tqsMOSeLNdv2U2M FWxVNMI2OxlWJe1PgvACiE1e/C/xQD9JmUseygEq8A9Vum7q8sJba0tOF95XNRWu kiIXNGW1qeu2kpWHEtWOSHJOPbTp1+NYSAKizRE8beNA0XfEMhbuUeyllgF9LmYV fJ8qzFidX7SWbZKWN26crK6CLwGi0NdBiqfSvws9WnS+RrOV8F99Dduahhfrx3y3 tHMsJZgYDZM9XciyOoZhP3VZLzLlmZjWmmRE137erVWLyLtqG1xyKMXK+zDgqg+Q osMKZ1p4knhRi6Xbq2t89q2l06KSlRXXMgUp+7OI/4PUSPyI9Nw= =BKKe -END PGP SIGNATURE-
[SECURITY] [DLA 1624-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.4.0-1~deb8u1 CVE ID : not yet available Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. For Debian 8 "Jessie", this problem has been fixed in version 1:60.4.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlws8kkACgkQnUbEiOQ2 gwIs0RAAumtzhhGmJn/wXD2UcgQ/YYDP4iOcmD4zyp8er/C9VyQL+Alz7ZnXPrzF xExFV806XhDItS+wEqPmjeK8fhJxcdWcda9DNBYeYIaHfKRspbAb8zyETyDAuRnV Mmv9GF0ep13BiHxNffP0jLVLyJHPznRfcX3mBew67lpAsniBagyrVH9IqBColacm HSc7B6WKGN7H3ATm1Y7603+zGNIX2b7IObTDYOIq7VRCQfWnezgk5QH8qepuieB0 fSSzlRC0ejdX01YtHeeEdXOg5R8P+GiUs+TSrMjmj4yYrpTEQFGE+Xo4sow9TnEh hdfNaVX5FU5JAxBCVb6wi6TCW1ayZULy4CZLn7OCFr3HRSA2/ciKqO7m6vuB+RuN +j0ukXqpLrpYuY40c+PyExO0Et7IS+WnLudDGPLryGCba8lQa+7ct4PiNdRawv8u dwS10Z/FikqyVluCmQRqMyiWoseKv7THFTOrHlJ4Tp3ibGrFj3n7hkpmAnJlR81p hEnm9POJgXuTXqwZ2ZqYjEJyXxDByi42y1e7v1zcTx/NN0VqVEWfX2GdwnPbgN7a JTOZmTPucJeGU7cv958w2CijIItOgnMCyCHVrUp7UtqmIwFJ9Uy526hHtpYmXvb5 BI14fWmciI0S3Mfp+CCB0D24dawRXaVZvDoVXNOLSrP/5skj5q8= =8qN5 -END PGP SIGNATURE-
[SECURITY] [DLA 1607-1] samba security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: samba Version: 2:4.2.14+dfsg-0+deb8u11 CVE ID : CVE-2018-14629 CVE-2018-16851 Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2018-14629 Florian Stuelpner discovered that Samba is vulnerable to infinite query recursion caused by CNAME loops, resulting in denial of service. CVE-2018-16851 Garming Sam of the Samba Team and Catalyst discovered a NULL pointer dereference vulnerability in the Samba AD DC LDAP server allowing a user able to read more than 256MB of LDAP entries to crash the Samba AD DC's LDAP server. For Debian 8 "Jessie", these problems have been fixed in version 2:4.2.14+dfsg-0+deb8u11. We recommend that you upgrade your samba packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlwU1JUACgkQnUbEiOQ2 gwLibw//ShDYbgo91SJUABxsdui88iTr0tUlQ0GrU4HaUy4jgUOzu15MTNfUQyF6 bD4plPOxzY0hR2mulDKr/yrRWPv23o+SNBu2TBAZu2J+Z2SAuuL94T8mKX0dOVpR Y14f5wemPhAKlghcHU/dNK9IZKwhuZdsurRoOra/g8vnX2igUmg2GDBUjs1pLirW Rk8QI6RHT+bIovXLAKHGLP9Tcv2RsZCVKh3Ftc+lAlWWkM9yV/5STsyi06On3e8k 1M9akanoO19IJfy3vnbqnU1XKg5yqXILJKQVR19wYdcpYtY1FAmvMHU7+3O6VyMZ pmrRZ1Gh1gv0tsFG4lLnvAHaP3YrjjWfUZXZcFo9IZg9u26cUyyHs+txX6kRcEj4 ztmREltbNJ1QoI+BQ11tWIAXhYfNNEF/h/PkWId47h2jmL7/B5egmOSTdJuP6AUv CAKlWY7hGpJteIUZUSWCljcWS7Dt41VGUkj85q+jpq4E/fy1DjmQDmTajILCt7dH JE9Q5iW25lOWju/xP3XfZYfo2bZWFI9TPylu6irmc+BQkWHPW/PgoGxlH1zHR6Gg tTkbZ82Ms/jg2BMJNytxCud+X+aw3BthYMaLqzBjfAvgwchGqsk5T6Js57YTCp4i swoEGcxZQrGpWupxU2OMeIMyr/KUm4tFyngmYRHyBrptCRG3whQ= =pn0a -END PGP SIGNATURE-
[SECURITY] [DLA 1606-1] gcc-4.9 bugfix update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: gcc-4.9 Version: 4.9.2-10+deb8u2 Debian Bug : 727621 This update fixes libstdc++ std::future support on armel, which is necessary to get firefox-esr and thunderbird updates built on that architecture. For Debian 8 "Jessie", this problem has been fixed in version 4.9.2-10+deb8u2. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlwTgIkACgkQnUbEiOQ2 gwJZvA/+NRDPy8WY9cLsyL4VUtXZmQUiGmMjuXm1Ejs32ds70gseqpBhrhRN2Lfm 5WHqKmsBsP0G5IJX5kW4vAvdeH/LKHTJxTMLbRHiIOhfBKRZEpKnzWCBxL3/UdsJ AWepCVIikeETpfaG6oo+76FjPHT6/ehr2CWoNKGCF0Xshu4DJkTlkGz5E0Pyex9E FAOOO/wDS6rJYzZhTGKc3GDxR+g7qZZp5B3+/ZfaQRZKKkYxY918cV/mTdkDHZSC 6VJsIe/X3IBN7GcChZEHZJ7UdbVxPibTjXoOMsIXPE9YuoTaUos5wk/oUe1j5roC xppD964oxxwb0SJtp2gBhAZZALfMBow02xTLSSP5Q8OOH7x1JCkkpHVf/DbtgXTV AHfCf/YlHqr5JkxnXrYVISAPufL72TwISZNGYYL7SZ6h3mQCfWNZ6RV1EoAgx3TL m1xIuRti7cSqT3QFgk4C+ZGJtNIA2DuWfKB0jTSUg5BiusX/clrQLNgewbmLZ6Ln 83uVaPup0PWOOcUInbH+KItjVVAPnP5EPvzvXKHjHUTwC2lhlnUXegVoYN3L3ixl GyNqyVYxif7oIsEan9LGBSIZMULr4zSp6RNfzYWuUF1Wkf+0YoRPHX2hbvUGzkrO aqhDjfeFJlRuskd/Eu+dZJ+6kIgOkHNiiwl+MqWK78uaQbJV+Yk= =5LPq -END PGP SIGNATURE-
[SECURITY] [DLA 1605-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.4.0esr-1~deb8u1 CVE ID : CVE-2018-12405 CVE-2018-17466 CVE-2018-18492 CVE-2018-18493 CVE-2018-18494 CVE-2018-18498 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or bypass of the same-origin policy. For Debian 8 "Jessie", these problems have been fixed in version 60.4.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlwSImAACgkQnUbEiOQ2 gwLlMBAAwo1B3o7wxJrtVCeyANxISuXGTkgZtaapwrjAk+8290hO5JiTEpxHZ+FO h2LBOEXnlThi7aC6POu0VWZNd3rtNYFWoFZjmrFxCnXcbi8mJ/xCAstDtPzYf1Gb C5VWD59ncmjXTr882/BwmSmA8IEV1XlJuTSLYrMwByx6PyumZCAyf71OBIO4QFCT 9rQMs2YgSNeeS0xCOAKjQtpRCkXc9QMHfybMicrrJGF7uwwHeSvb8qdm4oTqDqr1 88Bf5FSxh+0Sn/CdFBuQJnLsr/yM8uBbAvMVVygjE+Cndp3C5qZ4fO8rZLJGvAE1 kH7jT7OesjZG9nuC2M22g9x6Me3hyOkBtVC1stjjAjTPWnsGXthmmkPxJMagMTGb r678Msvwese/nvnZjiykLJZoEK4QwX1/0DI8HfGqc0DcJy26aXo+GXK90bOWAxgl uQhQGbBiOFew06XPltzvRVukGx30Zr/uTnQ1SS6gcMnTThxpvzgYlWG9lGFdcsvr 9c2a2L5IvYHP3sPYaDgGEIU4d9VI1q2gwrK+vzMRW6zozkag1Jt1VTTuoSEPTmB+ 6Gd/HosYSgOJCccb1R0bZu32fsq2jRvIc8UuV6hI5ZJeORFuYVB8Ni8x4gThqrH2 u5rpoZOEEqqSuzeR1IOiDSePLy3pOBx/NqOZhffEsSS7os/Dml0= =DJrV -END PGP SIGNATURE-
[SECURITY] [DLA 1590-1] openjdk-7 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: openjdk-7 Version: 7u181-2.6.14-2~deb8u1 CVE ID : CVE-2018-2952 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3214 Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in denial of service, sandbox bypass, incomplete TLS identity verification, information disclosure or the execution of arbitrary code. For Debian 8 "Jessie", these problems have been fixed in version 7u181-2.6.14-2~deb8u1. We recommend that you upgrade your openjdk-7 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlv3Kj0ACgkQnUbEiOQ2 gwJbGxAAsVBkVzBCDVXLIFQ0l9ZBCxaYnSxh1oNME5byy5E1mTklwsF7ATG4GtZo fEGYMw5V2yYNukN1BvBqnrE3vRrJEil6DdrOaHc0wnnagIWk/D11Dcr24S/UN5fQ +0LdvsSXfY+4U/VGF0qXTKbuOV9h2cp8vBGJ9bamRL7zLT3hc9OrAe/TKIpvp2tO rnCZqQOtiuGmJ86sHtRDNl8puFQJ5DQZTtywE+ROHG7hsUVym4X0yIokpXL5xUJa pxr4KXwq54QxD+7ieZVzAyZ24FpJf6GxDwHeVYa74vQXr+bExX8hr6PQheCYZncL WtEaKpjmomTIv3MQXgAmYM8q6UnjCM/cjQlHgUZ5GTTsP0NumiUPEBrGMkYL6Lk5 eYWJNai6OZnWwVzisDPy+eYM3JeZsGiRkRKGFAtu92Jujll0itGj7J0y9nSQUvNa soTxiaT/JVbvYEEEBzEqnLrPk+39YT+cLYyD3m0Fag+g0PVZ8Hrtt4EcUMPkssnh 21MUIQUUqfZkuD4B441EJhLF+pMqDmYtKfPrU8xuSylZju1NMZiEyTJXxBLZ 7v75TdP6lWCTYvlgE/ZtW1NZ4qKoSNVYxyGk+pSyClmUrOrvDoIt5sNjKV+DCrw8 iBUAOpY6H7pdvrfj0Vcap3VGU6eMB77lGbcQ/CQvhqUJ306XwSY= =bK1u -END PGP SIGNATURE-
[SECURITY] [DLA 1575-1] thunderbird security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: thunderbird Version: 1:60.3.0-1~deb8u1 CVE ID : CVE-2017-16541 CVE-2018-5156 CVE-2018-5187 CVE-2018-12361 CVE-2018-12367 CVE-2018-12371 CVE-2018-12376 CVE-2018-12377 CVE-2018-12378 CVE-2018-12379 CVE-2018-12383 CVE-2018-12385 CVE-2018-12389 CVE-2018-12390 CVE-2018-12392 CVE-2018-12393 Multiple security issues have been found in Thunderbird: Multiple memory safety errors and use-after-frees may lead to the execution of arbitrary code or denial of service. Debian follows the Thunderbird upstream releases. Support for the 52.x series has ended, so starting with this update we're now following the 60.x releases. Between 52.x and 60.x, Thunderbird has undergone significant internal updates, which makes it incompatible with a number of extensions. For more information please refer to https://support.mozilla.org/en-US/kb/new-thunderbird-60 For Debian 8 "Jessie", these problems have been fixed in version 1:60.3.0-1~deb8u1. We recommend that you upgrade your thunderbird packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlvpSBYACgkQnUbEiOQ2 gwLbkRAAsy6YWmnMQsw2XsmLShkkOVFUa8Y0wuYAUNer1QRcWKkWsaLTCc6ytg2U joxfwCGTdbalUaCj7Xsqa/+S9NFACZVjqZY1FYyuPPMNIIcG5i82IWUg+GKCDaGI 4S3gK9o/fHYki7Rnfj363SEGaRWhaLqnaIPbXiI8zYcFZ+6T1MgHEWcyN06RQ9fH 5BUVh8Om233+2Z0tIw8RTjdAPKyW+q442lWt5jcvKrlp7X8LXqYpiVM2382ss5VA kC1RhaXI3M59wjntwZSx3dEKacrNVhvFQN+pfcAhW9u814XR06Uvtvl4/nVcq8aN mIwU6f3870TgvpR7oNVb4laHFgA5RdjHOAtv1ZY5+PJ85v6apoqTDnmED/Cz6UsJ Q8pK1b0+On6RjYwHX+sWGnv+QGxwC+XJ1nkb/oQIhy7GUXlKLpJGdvCFIY2zH24t U8jsoTIUL48DaBg3541l7vJFb0gt81pBReYgzHL3rPxBpr2bKuLXfZ5OxAvvSLEy zddjoXezi0ZNMDPA1mbZel3g06rzzCu9LmwIm9LcIfbqdg9dI/MsNDS0cRYdvNQI YPK2hlekKlnp6bjrFj48c98ITxgLl1oHFPW6DsqWbXPy5lmwRM6p7SEee8/l/28D LXHXGBH9xOqJN21YPdkm/mKPEZjSmz8WMUh258TRq710CU9dUpI= =j+64 -END PGP SIGNATURE-
[SECURITY] [DLA 1569-2] libdatetime-timezone-perl regression update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 From: Emilio Pozuelo Monfort To: debian-lts-announce@lists.debian.org Subject: [SECURITY] [DLA 1569-2] libdatetime-timezone-perl regression update Package: libdatetime-timezone-perl Version: 1:1.75-2+2018g.1 The previous update of libdatetime-timezone-perl to tzdata version 2018g was incomplete due to a newly introduced rule type that this version of libdatetime-timezone-perl could not parse. For Debian 8 "Jessie", this problem has been fixed in version 1:1.75-2+2018g.1. We recommend that you upgrade your libdatetime-timezone-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlvjU+sACgkQnUbEiOQ2 gwJRHA/+OruVTesS0tKScFyc2n+FxV76UcFBfwvtenL1a+e7AoibR+8r/g9peqwl yUhG7NY3a2Wee9bfuGzI58EEzvGVCNrBpzHhZ7qRHecvKkBWQSaJI9wVwjzC45gI XKU8mv4bW9u7VWdX90kLzKtGVK9zq7RlTJcC5HVoSyjmkS33xOItjekqWux/0PbS CPSsZ+9mpPlWEm3WQ9+vkmKH9IaqnUWMdNXwJw6IodUcBnTbMqF28GbFpBLciyLJ /tnckA2baMLRjavLgyn9Zwgk1u0WO/LT1e+nSnMfmABbqf7HuPDqGLamKJX81TL/ wiRfm6WnrnaQeXDz8SSyl7X1UEHdWZrVHhhGq3yVKvrUwnASTsfz7gzEVAcfSvqo ptDH3CIbV9cw+TdYUoJk9YhbQkKl/D3nQUNtoz375n8eOsNcVMy/ttBirBWLT6bz iYtO835p31e+T2kH7k8J3B4kSzX/EcWY70/38b4DTyw40iTF/+5aaD3D18CLSnlt 2naZqdTxu0AahqC8fIrCYIQu7et8YGduI0VeNSfI6BzxQpRMYCVanYo9lQ8WfxgB 0+4V6Ae3luARE7KKOzUkSRl+TUt6F/qNVyrJz1EhYCCrWYXVKsD1vpPW71xgsDNc sKtfA5q/m5UOD0XvqydgQrFF8n9lo8whRvdjGgBljTWq5aeMYdE= =hwA1 -END PGP SIGNATURE-
[SECURITY] [DLA 1571-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: firefox-esr Version: 60.3.0esr-1~deb8u1 CVE ID : CVE-2018-12389 CVE-2018-12390 CVE-2018-12392 CVE-2018-12393 CVE-2018-12395 CVE-2018-12396 CVE-2018-12397 Multiple security issues have been found in the Mozilla Firefox web browser, which could result in the execution of arbitrary code, privilege escalation or information disclosure. For Debian 8 "Jessie", these problems have been fixed in version 60.3.0esr-1~deb8u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlvjU5IACgkQnUbEiOQ2 gwJ9hA//Z348eHhMaWesgQuBY6G6kQB4NxFAnTn6wJErpBnOBbGPHXV39RBk+uuO DYXwdfuFRvCRds/mnNv5iEHizvBbih/d8hEH2nM9j1L1Wxw4Xa+TFMJCSwU8zPM4 e1ILFkvC+PDKDLTfzdZdSr6aX/v2KqZJPQ2K9kKgFHHqi/jPDgzcIkEBtfQ9jXF4 m6bC0N8IyKtmjxOFe4yQtsMagDiQ9M37CRAQlZ6lyBRnLx+LifF+cx1y9ooYq3mG MXCOM18i2pA4BXhThu4Xj7/LcSBJMRvLlGh67XdHhrHn4Fa4lw34hkvv7DYJTv+X G//fzhfy+awC3wlQR+zAzEBmPlmS7AMl6wyNp8iXNYGHSMzQV9wNMeqEddb+nudF oAUXXSHoKHElZ+nvRSltHsMR+W9QA8Aywgf+fnKsISt8Z33MTABqdCQPIUj6UUYP DYh7HPdym/nXNTyeF2lvlXfe1dC/NHBp8cPJ66qSEmbF9x7onug2DYoSEvT/GAoD eUGsBfggWPt+HjC8cNqcAC9ypAOs6iYWVLmp8VCWYjsU4CL+tTZg6KV9mjz3xNii Wg+wkDoYVCnr0qB1vNdNgoX9kdpI4ZD3XI3tUwsKNIDWub/F/7TifLVUspYQX7Le iEEMk/MgnH9PzHeU9ZGNiHT8MpV/LUWljObBqs/qj6O9zI7MeQo= =Ud8S -END PGP SIGNATURE-
[SECURITY] [DLA 1570-1] mariadb-10.0 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: mariadb-10.0 Version: 10.0.37-0+deb8u1 CVE ID : CVE-2018-3143 CVE-2018-3156 CVE-2018-3174 CVE-2018-3251 CVE-2018-3282 Several issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.37. Please see the MariaDB 10.0 Release Notes for further details: https://mariadb.com/kb/en/mariadb/mariadb-10037-release-notes/ For Debian 8 "Jessie", these problems have been fixed in version 10.0.37-0+deb8u1. We recommend that you upgrade your mariadb-10.0 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlvjKdwACgkQnUbEiOQ2 gwIWKw//SWZ4mSZQT50RDitct3VW/SlxFWrfHs0cp5xTwd3gBASLt/XeRaepcI2C OF0Go14+c/w+FJZDsq8IkxCA+zNGZM67nHBuW1IRJpQwHJun0vWJitkbQTLmf1eD FmIZJLmInevwQ8ORSJwmLGdlWxRAHWIX3ZxFH3lt2f3sTH3RCZ7gy/jd3Y8zBIw6 G4yJWhE8VnWpwsP0ELXaxQMkxXcYlpbcx2X8stGdgPpZHSuebOU9BwLgBEvhQWRF aF8+PmjfaDi3oMVwrWSB6J4yakny+OhMq7uQoNNabo5uz+rjpPoQkHnoVCdtwY5K V1ypFaV6cGc/oNzt50xEL9LNv5dSxh5OFK1N0AGN+iXLvjVs2lLmWxBKK41+ZPMn 6yrdKGlvX6NHeerOyC6/Qegt+dokl2qKqHt6+pTqI7cb+U+xfyrzzIe1OIyiX/wu VCyr2k7jQI9t6g38UiMEwn6cLPmU2Fp9MNA1CJq5o+F1mLfE6/tfSzAcr5Xkzwpu Kbevz9wYVZMFYormsYpdqyjEOzSFjd6HdpLKYoHQ/M1X93ntHMqOstdTcBTlHf99 7D/GDxtC6Wa1l7pkJJZ5cUdawTyH/FuR9DimtLg7fIZsz4xvuLTwuIKdBlbpUF2a FN8xMV42WKWevUbCu7a/1i+9KCodsxPvRtEKHWFaPPaVo3JMX3M= =ZpBN -END PGP SIGNATURE-
[SECURITY] [DLA 1569-1] libdatetime-timezone-perl new upstream release
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: libdatetime-timezone-perl Version: 1:1.75-2+2018g This update includes the changes in tzdata 2018g for the Perl bindings. For the list of changes, see DLA-1363-1. For Debian 8 "Jessie", this problem has been fixed in version 1:1.75-2+2018g. We recommend that you upgrade your libdatetime-timezone-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlvjJXQACgkQnUbEiOQ2 gwIsAw/+KoFDu0NOk5MCqDo8HqTmVWfj/xCoe2WtGAa0iWZV7ZpFxcSq2E4XrsUV Sa0Bogdk+wTypEDYpEruaVFdcWzSsHjeiHLM8CZBlmPoj2T3iPo7vywtxVgBBFhh an3JCuw0yXDQwO7S+rK77c+XLFDjY2Nh/CGS3NHFSaSfQGDu1VG9HbEMzC9VmIpJ Ze/JgJcxJ8vpQoyu2Y+0mIiyLemvVR6pDAaYhal2ybrbHaBrlt6wYzK7MfF8fTGi FnEEXrHKH3HQKPLeLsBoSpPLfVKujobLwzDfJQh49lvo9yEvkluag9d9m4qzQqxG QrZ+9pf8Djo64vvZxku5STy+o7LseEXZyrhDrEc9oqMGH9iFaQJ7AacLw3xzWaGv BI/3r3iv58EmySPQlAKVXPjpWQzaAF46rE3vs0EbpuQI4aDyjo4fcJmZSZgqJrYz l99If8osiryVexRFzP+PLAZhnoxvvJ1jM2nWm/+SFgRuC8Rffbzf/4GYxmTOIzyz uWlpTQpnBId31Bi5Rorz/ZCqfPTkTSnSW7KvDLuGdjakwUgNei9awNoIkS7AYq4t NM2cRt7IOFKR5ivRndC80WTEnBBL4tG09c9BD+xo5Rj0ojjRcK8aoZ1wrzMEk2sw beawNgKMk+tUvv3FKiONCzJ6F2Fzw+T0N+vHuBNNLEw4LNfX2L0= =7RW6 -END PGP SIGNATURE-