External check

2020-11-08 Thread Security Tracker
CVE-2008-3655: missing from list
CVE-2020-25658: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.



Re: Is chromium updated?

2020-11-08 Thread Georgi Guninski
https://www.theregister.com/2020/11/04/google_chrome_critical_updates/

Wed 4 Nov 2020
If you're an update laggard, buck up: Chrome zero-days are being
exploited in the wild

Desktop and Android versions both at risk

On Sat, Oct 17, 2020 at 9:31 PM  wrote:
>
> Hi,
>
> 17 oct. 2020 à 14:28 de ggunin...@gmail.com:
>
> > On Debian stable, I have chromium Version: 83.0.4103.116-1~deb10u3
> >
> > >From Arch advisory on 2020-10-10:
> > The package chromium before version 86.0.4240.75-1 is vulnerable to
> > multiple issues including arbitrary code execution, access restriction
> > bypass, information disclosure and insufficient validation.
> > https://lists.archlinux.org/pipermail/arch-security/2020-October/001608.html
> >
> > Is Debian's chromium vulnerable now?
> >
> I would say yes for the time being indeed: 
> https://security-tracker.debian.org/tracker/source-package/chromium
> See "vulnerable" in 2nd column for CVE-2020-15967 to CVE-2020-15992 + 
> CVE-2020-6557
>
> Best regards,
> l0f4r0
>



[SECURITY] [DSA 4786-1] libexif security update

2020-11-08 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4786-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
November 08, 2020 https://www.debian.org/security/faq
- -

Package: libexif
CVE ID : CVE-2020-0452

It was discovered that a boundary check in libexif, a library to parse
EXIF files, could be optimised away by the compiler, resulting in
a potential buffer overflow.

For the stable distribution (buster), this problem has been fixed in
version 0.6.21-5.1+deb10u5.

We recommend that you upgrade your libexif packages.

For the detailed security status of libexif please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libexif

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl+oCFAACgkQEMKTtsN8
TjawTBAAvQ/VB+0Nlbd9plOAUFtse3jrtgALiAczERsAntbBUOQweblDS/xK21Ng
qlMaNpPspmMcbsLu+3kwKs8rO2sG5i50DkfyXYwshVENLLgG7jbvJ/LH1XLLKzPe
yazeKybNaH7zqiONr3q+45av8+dPeLjsjJjY9Up8wKM9Fkyh6VZqkgd14ixzTP4A
/qPl9cU1oz+XrAz9kml85Xbq61IiM+7fRJv2yUimYkWxPGHJf2xPp0o55KPPz6x9
Yl4EwAjU7AsAhc+BEKAx8xIFsEYdtq3Ym3EXd5UTQSIi9K2WqM+TbuLKFeWkysdF
YRz2yifQhIg4NRMMMKXP5JV/P6Kma91LvqHbU1ZN70V0Ts9SClZAvQene9npCuFa
fc98/KcilRofhpdKfPFMwf5LaNrytJcC9ue8enM+Xj/iLDM2S6AwNzEZAKv/liYP
hdAVbK9QETcobUe0jrLEubbmUqezMEl1s6GgqljqJOVkz1LHZZK/YvSUnhsXxkqA
MTqKuM7mJVbJsDEvgFa3BdGJuH1E4ya6x+TwJFw4DmJ+acXHZ+0k4/iuZwK/QloN
x26jdr25WjwRqp/vmTcxTYp5Sxl2zv3BRLh+EJasBbB58pIxYPAQzLnEIA8KmiGJ
SyNR3qoSPcN5kchT+IkS673zPFRGosyOYaDxKn2Z4a2bGnoMuVo=
=Yb9P
-END PGP SIGNATURE-