[SECURITY] [DSA 5632-1] composer security update

2024-03-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5632-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 26, 2024 https://www.debian.org/security/faq
- -

Package: composer
CVE ID : CVE-2024-24821
Debian Bug : 1063603

It was discovered that composer, a dependency manager for the PHP
language, processed files in the local working directory. This could
lead to local privilege escalation or malicious code execution. Due to
a technical issue this email was not sent on 2024-02-26 like it should
have.

For the oldstable distribution (bullseye), this problem has been fixed
in version 2.0.9-2+deb11u2.

For the stable distribution (bookworm), this problem has been fixed in
version 2.5.5-1+deb12u1.

We recommend that you upgrade your composer packages.

For the detailed security status of composer please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/composer

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmX0DyUACgkQEL6Jg/PV
nWSBoggAmRdaBN8p7agJH0S2fvEJWuF+gFAAY4112EeOzbHwk/Bm6EuTY9VcGTtj
HlW8X3t/H1+NW5xejcm1gEaXIE2HHIc1KTaG3ui/kKC2T3ybx0cmnqYWu/TJWmw+
nbaneBK74PkXukzFvjuYaOy7a6EgnpNcMhc0b2tc/IqIUOYiePKbg4lio8u6q5rP
5uFIJydeqI0IXja6H4N0ub/zOAn6I6C3ToKMa0WnfllmrMaj/JnBbgam3VrT06n6
3NoW6xZepdMDP3QofOVWWP5HshF/0CH1BGEcKS6AtAaIgARalFMgbP6SU8NDsgNF
Q3UCiuR+sTjZc2YA0muIpmBGSPVyAw==
=y4my
-END PGP SIGNATURE-



[SECURITY] [DSA 5601-1] php-phpseclib3 security update

2024-01-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5601-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 12, 2024  https://www.debian.org/security/faq
- -

Package: php-phpseclib3
CVE ID : CVE-2023-48795

Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the
SSH protocol is prone to a prefix truncation attack, known as the
"Terrapin attack". This attack allows a MITM attacker to effect a
limited break of the integrity of the early encrypted SSH transport
protocol by sending extra messages prior to the commencement of
encryption, and deleting an equal number of consecutive messages
immediately after encryption starts.

Details can be found at https://terrapin-attack.com/

For the stable distribution (bookworm), this problem has been fixed in
version 3.0.19-1+deb12u2.

We recommend that you upgrade your php-phpseclib3 packages.

For the detailed security status of php-phpseclib3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-phpseclib3

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmWg5QQACgkQEL6Jg/PV
nWRUKwf/QGg/4t/cvkkj4MAEJs5GLxmT/UpIUdhEMjVtpVZk6k6m9K/OK3/3EXuT
XYtNhIyByOiWpLt5kMBrG9I5tz6/ffErfiPYYJso7fWyAaWKopFp0qsYGe8FDq0a
VSKo51b+SHPDtMxCxahTdkegaSCpjaEFiWZNd0/h4ZvS3ZNuOFQXcPor+mTIHqJT
PkkpsMm9Qg7skmDrrlENLvDRgXn8HuJa0h2+vhNnSwfC/cTDKPICeOozB4qMWu4Q
YzlMSKC/mLJIVlqmVufQndnHLYlKLexusiCCckn/B/irOS5FRrOkXqfPmOtgpC9e
DLhP7y/CkMhwhR6Ty/oOR/62zhhZpg==
=/Vah
-END PGP SIGNATURE-



[SECURITY] [DSA 5600-1] php-phpseclib security update

2024-01-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5600-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 12, 2024  https://www.debian.org/security/faq
- -

Package: php-phpseclib
CVE ID : CVE-2023-48795

Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the
SSH protocol is prone to a prefix truncation attack, known as the
"Terrapin attack". This attack allows a MITM attacker to effect a
limited break of the integrity of the early encrypted SSH transport
protocol by sending extra messages prior to the commencement of
encryption, and deleting an equal number of consecutive messages
immediately after encryption starts.

Details can be found at https://terrapin-attack.com/

For the oldstable distribution (bullseye), this problem has been fixed
in version 2.0.30-2+deb11u1.

For the stable distribution (bookworm), this problem has been fixed in
version 2.0.42-1+deb12u1.

We recommend that you upgrade your php-phpseclib packages.

For the detailed security status of php-phpseclib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-phpseclib

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmWg5P4ACgkQEL6Jg/PV
nWTO8Qf+MjlqXFJ0p865PgV30sQmWeJmc8UiX/lOO9ayLUZ13Dj4z74H40XxAz0M
rHDnpfs3hvtgTkdRkE+k2FvrMgau+EpN1eGwgrHURHN/Kdz9Z6YLQX/T8LZq97SZ
VVu/X/+xkiZng0J+UXZx5BWQFf/vGz5vLiPA3JUSgS3KjwOYiZKIaSf+/7SF48he
QTucpa7nC/7ew4dgLLNTa9PQWK8C616cJ6iZZaowi8k3QmUQGkyhuXS0EUHHRkxq
EEf7HccwpwYbPAAkh5cIckEoXEC2gUkl2UmpzCFNdJl/xqz02xOfcgoDxM/1bYy2
Bn3cNLe681fmEd7ShPdNTYtqz6YvwQ==
=ZVcV
-END PGP SIGNATURE-



[SECURITY] [DSA 5599-1] phpseclib security update

2024-01-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5599-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 12, 2024  https://www.debian.org/security/faq
- -

Package: phpseclib
CVE ID : CVE-2023-48795

Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the
SSH protocol is prone to a prefix truncation attack, known as the
"Terrapin attack". This attack allows a MITM attacker to effect a
limited break of the integrity of the early encrypted SSH transport
protocol by sending extra messages prior to the commencement of
encryption, and deleting an equal number of consecutive messages
immediately after encryption starts.

Details can be found at https://terrapin-attack.com/

For the oldstable distribution (bullseye), this problem has been fixed
in version 1.0.19-3+deb11u1.

For the stable distribution (bookworm), this problem has been fixed in
version 1.0.20-1+deb12u1.

We recommend that you upgrade your phpseclib packages.

For the detailed security status of phpseclib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/phpseclib

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmWg5PMACgkQEL6Jg/PV
nWS6iwgAgCFsThzoeNHG05PouaajhL6LvGsrj+cwed14VEnr0TGpChD6y2Z/deZX
HW86VXSHRZvqNTt7+UQvKUwrmvbNRZL3TQoTp9l+VKtn3wT/0Q6Zf1jsn4G+yffX
dredHf2pXgJh9poEy2DUTunVF+vpZdp9fS2QY8xp24kNbk8kk6itJeOGueWoFwrZ
p1B5q2hnQdFtM8mhbXDzViqbiu6zVZOmSXri1jShAKRDl0kpRQvfP1mKE+j5RMoJ
kBGFGuWnIXvxtwQEYDvobgKk5Ie0yzwqnD6m3WXMeS9x4Zi+HvV3hXvEu0UvvQXC
1z8VX31cFffkLLDFpO3cE9dQlyABBA==
=Rz3N
-END PGP SIGNATURE-



[SECURITY] [DSA 5572-1] roundcube security update

2023-12-04 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5572-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 04, 2023 https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2023-47272
Debian Bug : 1055421

Rene Rehme discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not properly set headers when handling
attachments. This would allow an attacker to load arbitrary JavaScript
code.

For the oldstable distribution (bullseye), this problem has been fixed
in version 1.4.15+dfsg.1-1~deb11u2.

For the stable distribution (bookworm), this problem has been fixed in
version 1.6.5+dfsg-1~deb12u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmVtkOQACgkQEL6Jg/PV
nWTxhQgAimG1yVgg/Ic84EQIqpB014hb/ev5RzapM+xJ5Dwwb1Xs7HMNsvqYBBeX
LNIbXgNKkSGF38k3MP2A9aBwyKMV256SVEtKUkiAzCQhX3xsUB5EkpNMXv0GRs9k
sjjj/ATwChVVlz5OusTtuDpog44RYGH8CXJTuAVemK2GusdgkrsMu1EvGr7JhtMv
jiFW5uYFjI+ADp5KcoIl3AtLCdYhDHz/p687Ze1vJQ0v18jiS2mUMvF7zd8SmwA4
uLPAcLIJ+KCyd8A+LYzyWbHVxbxIqMxmuAjQ7TrOH3oE5Be5jN9ShKJv1pj50P2i
5/g4H+e5fQ6gQm8oF1CMVJubS1NpIg==
=KGev
-END PGP SIGNATURE-



[SECURITY] [DSA 5531-1] roundcube security update

2023-10-23 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5531-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 23, 2023  https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2023-5631
Debian Bug : 1054079

It was discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not properly sanitize HTML
messages. This would allow an attacker to load arbitrary JavaScript
code.

For the oldstable distribution (bullseye), this problem has been fixed
in version 1.4.15+dfsg.1-1~deb11u1.

For the stable distribution (bookworm), this problem has been fixed in
version 1.6.4+dfsg-1~deb12u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmU2FhEACgkQEL6Jg/PV
nWTgbQf/T08r3SQ/NFUpzs1/8k+euPOyysNFnW7JZ1LcI+ug5iF8RrdEVVuURZHK
7i/SuRNomgEQbUyVpgSb9rb6z5qkc0k6gbfh2+KMRk0ViHhG1+tuEe1O99abXt+5
LUQNtXWVMAniWWdbtdQeCBHWgxMpstarWq4akgCnx1Dj7Tj8PyX05+bYFpR79WMq
CKypX4lz1kP8U3U5c0tPDi/zjuzGT1IvVSyWPesaNHzmD4ZMr9A/dcDBtxQ+kTaP
N3GVPJoDG9TVOcHQTqcb2MmTQY5FtvQswVCXiEsugbmgOQ4wiUYlV90C8s4ALSxB
Biv+mOUCKZH/mNNjNeHKADW+nOkOeg==
=TSzb
-END PGP SIGNATURE-



[SECURITY] [DSA 5399-1] odoo security update

2023-05-05 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5399-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 05, 2023  https://www.debian.org/security/faq
- -

Package: odoo
CVE ID : CVE-2021-23166 CVE-2021-23176 CVE-2021-23178 CVE-2021-23186 
 CVE-2021-23203 CVE-2021-26263 CVE-2021-26947 CVE-2021-44476 
 CVE-2021-44775 CVE-2021-45071 CVE-2021-45111

Several vulnerabilities were discovered in odoo, a suite of web based
open source business apps.

CVE-2021-44775, CVE-2021-26947, CVE-2021-45071, CVE-2021-26263:

  XSS allowing remote attacker to inject arbitrary commands.

CVE-2021-45111:

  Incorrect access control allowing authenticated remote user to
  create user accounts and access restricted data.

CVE-2021-44476, CVE-2021-23166:

  Incorrect access control allowing authenticated remote administrator
  to access local files on the server.

CVE-2021-23186:

  Incorrect access control allowing authenticated remote administrator
  to modify database contents of other tenants.

CVE-2021-23178:

  Incorrect access control allowing authenticated remote user to
  use another user's payment method.

CVE-2021-23176:

  Incorrect access control allowing authenticated remote user to
  access accounting information.

CVE-2021-23203:

  Incorrect access control allowing authenticated remote user to
  access arbitrary documents via PDF exports.

For the stable distribution (bullseye), these problems have been fixed in
version 14.0.0+dfsg.2-7+deb11u1.

We recommend that you upgrade your odoo packages.

For the detailed security status of odoo please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/odoo

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmRU7kEACgkQEL6Jg/PV
nWTQrAf+K6CpxmFeKM/7G70xafsw+lLu4UlaoLYUh55rgsFd9/YHUuwCHiCmoP1P
4GnVJkNu6qj8rW1EReUtKZ76XQTLsD9ZxgM6tFBGA9EDi0hPjR4KEI7jtdXjx9ro
8LOyu51xeqoraKTmkPw+EnUCWCjutH78l8y9ywqHORQI0WM9Q2Zh0fHJz1c+2uzd
HqFvo1brOgu7zkI3luH8IjEHpCHpUVbe8rTnY0g2PSrZott/k0fIZ8qNSzyfG7ah
R5auoI5y+z5TusByKWnQ48jQCbU8WeqXaQUqT/pGtjGz9ljClTwDkmqqv/6BNnyF
Et5uV+Yn6UWsxXUcz6u9CwOzkrpVxA==
=KDFV
-END PGP SIGNATURE-



[SECURITY] [DSA 5367-1] spip security update

2023-03-01 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5367-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 02, 2023https://www.debian.org/security/faq
- -

Package: spip
CVE ID : CVE-2023-27372

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to execute arbitrary code.

For the stable distribution (bullseye), this problem has been fixed in
version 3.2.11-3+deb11u7.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmQAP4QACgkQEL6Jg/PV
nWSHawgAm8iQlTcFT98cMImGBx8XTO70YPcgzIMK87mvmQn3NR30/dM9icfBVVu3
l9Ks2mPa0yYIT0DTeXghTclf8hnJtOM2T4buRPD6po6ZyEgX5AlwN6xaZPAkYxiz
+7GXiqYZAHAMShIZhhMr1CcIDsE093TC8dLdZFosSVtI7sylxTgbSlJl1xafhe6/
6fhI2DcDr4ov7MrkfcjCT2BY9um/pH/L2lIKTDcHahgoxGf9wcurANtwHwHQsBNR
3R5nxScH/1wTI53am6rPCYFuLGlGEcY6c2HyJPR3j3o+sUFYca+4fGNbmwuS8fOh
hOgz19DTow374IwJU1qnoZjvrbB58g==
=CcjC
-END PGP SIGNATURE-



[SECURITY] [DSA 5325-1] spip security update

2023-01-24 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5325-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 24, 2023  https://www.debian.org/security/faq
- -

Package: spip

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to SQL injection attacks, or bypass
authorization access.

For the stable distribution (bullseye), this problem has been fixed in
version 3.2.11-3+deb11u6.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmPPpdYACgkQEL6Jg/PV
nWT7GQgAgemz9C/cvulSLwEuV38WAaZwy8RFC3CGw3DirFLf2tVeC6KDI+tGs/u4
XSY7M45xEr4y1TR3NMfovrnX6iR/JgPU/3ZJsFquq8O5Z9WCeZFe2YCkmuqP9hQv
txXfOoL4c9b1hfgtv4nVcqLyCFFJhfqLiAy8Eb18vzuggjLVYKa1kioa8wAGk/YB
B9rvoKNN1bBfow7A7704Gk2bJMfcxIC9P4anHm6u0OZ4HgC0GYpVYZXegfrFICs7
fylqgcg6Ub+HH+6e3wEDN1oqnj0IQDy09lFj4kCT5xQjhQM8oMZChExndWdmRRI2
iEmUN/gg7RVhdUfNvv8VTy1lo+wd4g==
=XA3L
-END PGP SIGNATURE-



[SECURITY] [DSA 5279-2] wordpress security update

2022-11-16 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5279-2   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 17, 2022 https://www.debian.org/security/faq
- -

Package: wordpress
Debian Bug : 1007005 1018863 1022575 1024249

The wordpress package released in DSA-5279-1 had incorrect
dependencies that could not be satisfied in Debian stable: this update
corrects the problem. For reference, the original advisory text is
provided here again:

  Several vulnerabilities were discovered in Wordpress, a web blogging
  tool. They allowed remote attackers to perform SQL injection, create
  open redirects, bypass authorization access, or perform Cross-Site
  Request Forgery (CSRF) or Cross-Site Scripting (XSS) attacks.

For the stable distribution (bullseye), this problem has been fixed in
version 5.7.8+dfsg1-0+deb11u2.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmN13KoACgkQEL6Jg/PV
nWSnyggAvAS8Crzgp8xW8FvZ20pEz0uXm8oW+5sUR7U+c6vsUPXBa2yT+pLNyCGn
Ss9ffvl+IVnfZEHK70PvK61thKS9yhtse0fy25HljMnsBBSzMtjZEwZOHGpERNRW
Yf7Cm5ubIlKumKLodGh+Ecun01DRawfG/W4V+sBnDZWGdn9+B9K6q7vYLRDowshi
sdJczvrRn2vr88V+LLzbgVDv3M1WcM+dbyEOOtxY29ELuHODgafZNIiMyjxpy3RI
iZg5c2uS4RxojN61TxKpD2ewdSRrqAy51SspUSMZIV9l2hQkhMfOm/8x1MLAWVO0
v/PaS8NsyR1P454NCwhRRmNbJ5252w==
=hTKc
-END PGP SIGNATURE-



[SECURITY] [DSA 5279-1] wordpress security update

2022-11-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5279-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 15, 2022 https://www.debian.org/security/faq
- -

Package: wordpress
Debian Bug : 1007005 1018863 1022575

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform SQL injection, create
open redirects, bypass authorization access, or perform Cross-Site
Request Forgery (CSRF) or Cross-Site Scripting (XSS) attacks.

For the stable distribution (bullseye), this problem has been fixed in
version 5.7.8+dfsg1-0+deb11u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmNzzVQACgkQEL6Jg/PV
nWQM0wf/e4a7tlCxa11letnmRkSODUvOyq1/7DrzEX75Jne/PlhjeNPTgBSk5Wlz
JlQ/enK93HDu7Sy4IrVHio24s48wZs9rP+Vo2z53K6bmEsDdIkBSRlJ1YuMlNIxm
oaNKhNcy+JumXcS7u35ok7T7tIO1TBkpBZgIiEDg3MoeYN4v6E6mG6F7zTZ96Nyq
wFRHwv3huca5ptmQq1tpofVuF1hlskwiGyFKlZ9SgcIibOqKz+sNjE0Ei//ZjEX5
vHnexoBk6Mf67veB8DktFCECXK65PDuXCvbSROr1cfVzI848sY6PwgYgFSvBf5vL
F4ojg/qDFj08o5J978YeKHs0SX4bmg==
=U6JF
-END PGP SIGNATURE-



[SECURITY] [DSA 5246-1] php-twig security update

2022-10-04 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5246-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 04, 2022  https://www.debian.org/security/faq
- -

Package: php-twig
CVE ID : CVE-2022-39261
Debian Bug : 1020991

Marlon Starkloff discovered that twig, a template engine for PHP, did
not correctly enforce sandboxing. This would allow a malicious user to
execute arbitrary code.

For the stable distribution (bullseye), this problem has been fixed in
version 2.14.3-1+deb11u2.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-twig

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmM9FmYACgkQEL6Jg/PV
nWSFYwgAoCAOajgv28W7jI5bDu/XCf3h/kmFfniaes3oEQd8H26pIHOOjLm5F4hc
w1c6soR6UyuxkkpiIMucgqcRXXzWEgWg6fLb2PHe7Msot8aiDdH/u/KQfCwhJtQI
alGalArG5IG73A/wSAo8GcH/f04u5wM8lOn/p821k9n0e4/9DgMA225KWeNYSrZJ
1FG5Q5pVl4+BEsyz2OEvSjgc/XcNOimQAk4Xauajab6eTMGCGdAnz7Tak4CDg7Q/
oCvu1sA2l+MS7G3fBu+nrK05EmQ2kmv57WgVHsqCli25crTbC13Y/k558DeoXp04
ocIzEOC1Bj/D9tKW+VONeJLutOluIA==
=ZL2h
-END PGP SIGNATURE-



[SECURITY] [DSA 5152-1] spip security update

2022-05-30 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5152-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 30, 2022  https://www.debian.org/security/faq
- -

Package: spip

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to perform cross-site scripting attacks.

For the oldstable distribution (buster), this problem has been fixed
in version 3.2.4-1+deb10u8.

For the stable distribution (bullseye), this problem has been fixed in
version 3.2.11-3+deb11u4.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmKUyKkACgkQEL6Jg/PV
nWTbkgf+J37VfIWXY24URdU6ql2hCwQIEy7liMvtPk5Mu7tYdTR716q0tMZ2nglj
NGFQg2mJjppcKYAMM8Z9JI/KFgAT9qI+U0gAdvlbx7wS8yuIoi9cptSPpctP5esB
Xjq9Xj4lHc50CH7hVEhZZIhCMsa4frgC/QMBhopfVIzOlRBGX5MTjonYmkQKKplG
JkBP3YhT5rRkWCcOFOjQoeH/995tDj/PssJeYPY/giyvOvgO1OKupfmHXalZdTko
cptwCNXqN2vElcwY+1cTatTTQZZBqen22QViHTgqZNrdGg25iBKrOhW5t63810NX
0X1hWCaJJrY3PSL+BmQR6xJkgbngmQ==
=IRRI
-END PGP SIGNATURE-



[SECURITY] [DSA 5107-1] php-twig security update

2022-03-24 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5107-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 24, 2022https://www.debian.org/security/faq
- -

Package: php-twig
CVE ID : CVE-2022-23614

Marlon Starkloff discovered that twig, a template engine for PHP, did
not correctly enforce sandboxing. This would allow a malicious user to
execute arbitrary code.

For the stable distribution (bullseye), this problem has been fixed in
version 2.14.3-1+deb11u1.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-twig

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmI8C+YACgkQEL6Jg/PV
nWRKJwf/eM74S/zXlGgnwglxC0SVvCUJ9ECfSaar019cj0SxUmc3wQHIw9XRzRQj
6HYXlQTq5EiqyrZK4MGGOIfgnbHXzOhIYsEPf8LRZ4KObre6fugC7SrrDaT3Q0wt
vDad/cPHIZZU6EOfDAIjj421lFxBQrq6N8ymxeTTEwRT3hXCGBj+L/V8nCcXdLye
A3mq+Rgwzo/Thl9skjbGkx1mPOQNCCeCO6aypoEtz53MkhLVNIb2GTIZ1D7xHgX9
9SuS76HoZVeDz7MGfJLT+OQsIYy4WoqaNCeoImo1dDnhQPh86RWTUEdb4rlaQl4I
qOstysTI81KlEFauCSddaryGi2limQ==
=h+PK
-END PGP SIGNATURE-



[SECURITY] [DSA 5093-1] spip security update

2022-03-08 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5093-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 08, 2022https://www.debian.org/security/faq
- -

Package: spip

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to execute arbitrary code.

For the oldstable distribution (buster), this problem has been fixed
in version 3.2.4-1+deb10u7.

For the stable distribution (bullseye), this problem has been fixed in
version 3.2.11-3+deb11u3.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmIneEMACgkQEL6Jg/PV
nWTmtwf/elvZeq4j7byfvYbUCBPgrtv6qJEmuqD6pYAd3F2siK5RH0mn9LRnzsp2
VpFlhbEHtC5YD73ulqaUQk4SRX2AXfmYDxvj3H1xxhK/wCPrE+UajMGYo2/d4Ig+
2SUg1oeVqB3X6S5ePKmTafdTfMDTQmH7gOTW6f80ZhgbAbMz/832rGvjH7arYprW
8v0dokNWq37zo0TH6du+J30jrKGeoMuMHY0ACNr+4BlZLBcXYJPDvZsRv0tzLewK
trP4t/FqSh/Dr2v0+6o/f3Gk7J/f1VOv1plOf2PGh5xz7GRRR6cFPhw12Hvli+hY
A+rjnaDUUklXvQFWW45+T6uokfY8zQ==
=k7Wq
-END PGP SIGNATURE-



[SECURITY] [DSA 5078-1] zsh security update

2022-02-16 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5078-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 16, 2022 https://www.debian.org/security/faq
- -

Package: zsh
CVE ID : CVE-2021-45444

It was discovered that zsh, a powerful shell and scripting language,
did not prevent recursive prompt expansion. This would allow an
attacker to execute arbitrary commands into a user's shell, for
instance by tricking a vcs_info user into checking out a git branch
with a specially crafted name.

For the oldstable distribution (buster), this problem has been fixed
in version 5.7.1-1+deb10u1.

For the stable distribution (bullseye), this problem has been fixed in
version 5.8-6+deb11u1.

We recommend that you upgrade your zsh packages.

For the detailed security status of zsh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/zsh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmIM+lsACgkQEL6Jg/PV
nWSdbwgAnFfNdi+FHSZ01O4ecnKII5d9/BAZWhEcbKTZY7Yz8h1JyKNoSkm46VG2
BuTdN6sGMtkcZ+0+DmQBfLvfaZ2Eelt6UaaHkwg21XyLabrd+xfEdG++bLg55rGg
arUTN+mIRG+L+2UQXMSYoXPSubTPA/ZaR4BIyWQpK+xN+nyG0cm2WKE4OZl/ahnn
zdqnhncaJ2l4L4Q4IttK3c1Zhqb/OwMFaad/C45gBb85doNFnImf9iZNa52Mt807
XIXcK+OYPQ82Au4reftBrjAiccGua0emkY2XI0X5Zhu/R/VNTB0MIz9PubOKMNNg
SFwWrhmbuO0OY9jI51TvmFG43OHHSg==
=mhTR
-END PGP SIGNATURE-



[SECURITY] [DSA 5049-1] flatpak security update

2022-01-20 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5049-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 20, 2022  https://www.debian.org/security/faq
- -

Package: flatpak
CVE ID : CVE-2021-43860 CVE-2022-21682

Several vulnerabilities were discovered in Flatpak, an application
deployment framework for desktop apps.

CVE-2021-43860

Ryan Gonzalez discovered that Flatpak didn't properly validate
that the permissions displayed to the user for an app at install
time match the actual permissions granted to the app at
runtime. Malicious apps could therefore grant themselves
permissions without the consent of the user.

CVE-2022-21682

Flatpak didn't always prevent a malicious flatpak-builder user
from writing to the local filesystem.

For the stable distribution (bullseye), these problems have been fixed
in version 1.10.7-0+deb11u1.

Please note that flatpak-builder also needed an update for
compatibility, and is now at version 1.0.12-1+deb11u1 in bullseye.

We recommend that you upgrade your flatpak and flatpak-builder
packages.

For the detailed security status of flatpak please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/flatpak

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmHpgJoACgkQEL6Jg/PV
nWRyUQgAu1+LB+AIijfPxQvVTzAY2yjOGG1vycEOaPr2U1k5PA+zygYxvGDZzPqs
5cenbSA/aXacL4dwXlA7VJ+xgRi7ZgqEZN9qiO9cyt381RnIVTppkhpfJv0IEf0a
MywZjPp4LzSHD8v8oTfJFcXbjbOr9zEPCh8Yn4zcLShEeQYzMLQLO5yJLcLWqbf5
OV9zWlLFhEdb8tZFVMzpHk1WZBv2/Bp5v7nQXBWuDfBZXmorzLkq5epNgjkvi0Lc
uYGhJx620eALeCvimXlGc7O9yhvjMNfWf1niQ5hkBcii3uLpaCtcfBBYzg2jlbcl
V3yYN2wjXy3SvLKK13ZONM0QQxjW9Q==
=UXE7
-END PGP SIGNATURE-



[SECURITY] [DSA 5039-1] wordpress security update

2022-01-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5039-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 11, 2022  https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2022-21661 CVE-2022-21662 CVE-2022-21663 CVE-2022-21664
Debian Bug : 1003243

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform SQL injection, run
unchecked SQL queries, bypass hardening, or perform Cross-Site
Scripting (XSS) attacks.

For the oldstable distribution (buster), these problems have been fixed
in version 5.0.15+dfsg1-0+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 5.7.5+dfsg1-0+deb11u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmHdSCUACgkQEL6Jg/PV
nWTjaAgAw5g913TqTXAvlzsCDGfFItlDFx/wGhAwyMdrHsapmXBQiUixjKuINAzh
UaRgcH1DGvDu68QVupg9dtV8cvcIRocsofw9DMsjZdFjYakQULsooaff+IE8f0Oa
PqQcQYo5c+3CYQ2gMFEeaS8QH8fMc5g/OrDfltEzqWjratk7pbOCTruASW5XO8+j
Jf/qJ1buGdNJK7UskXLqoeQ0y2bMsXbDd5Hk6ktzw13WJbwT/0D26e/MK7y8F7ZH
4R6PFYnzwhHklxaU+sJwreWgVOiK/bsGONhtgWQcYYVsOEZGKO3IKiniSIuaydKf
nYf5qUFDxoSGsj1YtFx2WWQVfi2Jhw==
=whm3
-END PGP SIGNATURE-



[SECURITY] [DSA 5037-1] roundcube security update

2022-01-08 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5037-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 08, 2022  https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2021-46144
Debian Bug : 1003027

It was discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not properly sanitize HTML
messages. This would allow an attacker to perform Cross-Side Scripting
(XSS) attacks.

For the oldstable distribution (buster), this problem has been fixed
in version 1.3.17+dfsg.1-1~deb10u2.

For the stable distribution (bullseye), this problem has been fixed in
version 1.4.13+dfsg.1-1~deb11u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmHZX6wACgkQEL6Jg/PV
nWSYVQf9EFHhiq/2vslud8iQ2SqygR3IDJnqhgxlR4AVX/digxTcx1JZJPQ+RtYY
bTvlwEQnOq7bHioQ+r3kcPzyH+VhC6e6F7gQVxtrkSPWl2vifaII+k0lRC3+nuJ8
8FEFF1k2dX0F6Q4IJIhiZaIYpHS1Jlu6BHjr9ZsHlY8ZqqENSZ8OCF02GtOVxWqi
SEG5At8QTuOgRVUxjn+LDpDzasDug4Ogx7Yp3yqAOz90EmoX99FTmAfDf+HfnTEn
ikXjjvC8efSCAnRRcax59pFCGOKnP35/o+DiT6eXFNrV0E5n5usO2wyzpkb1aiaN
kMDkZHfYMZuTR6yeBGjiPaCf1S0PxQ==
=uY/N
-END PGP SIGNATURE-



[SECURITY] [DSA 5028-1] spip security update

2021-12-21 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5028-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 22, 2021 https://www.debian.org/security/faq
- -

Package: spip

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to perform cross-site scripting and SQL
injection attacks, or execute arbitrary code.

For the oldstable distribution (buster), this problem has been fixed
in version 3.2.4-1+deb10u5.

For the stable distribution (bullseye), this problem has been fixed in
version 3.2.11-3+deb11u1.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmHC17MACgkQEL6Jg/PV
nWSTCgf+Nnp2PRp1FvvagyvH02s9aGygJnBFzD4NVvJCpiO9YnXnMm1F1U2LLQCA
usXjnMFG5Y45+8FSQQVW3IeQzUVWlHUXmON+F2rT32+JByqNwlsUEjGwNYvgO+EB
jYnPqGRgqgq48POx9Csp4rZW/e0/HX7YSrSqgPQnNQh+LJPlIuN6KkJoNwJZiM8/
ZiedEtvNfyUmWSgHXytnpcqsHbb4Nyyquqxr42DEL83cd4++3/nwNtRwHInJYL/2
Jk1GxuOoJr1ogQyepOdsDpmM0Vxeh6uZWIrPaBWWhraLvwQ0f8z7V/V2rU82tz0g
R4WR2hk3968GnkNOaRqSDDwquDQtYg==
=3W1N
-END PGP SIGNATURE-



[SECURITY] [DSA 5013-1] roundcube security update

2021-11-27 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5013-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 27, 2021 https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2021-44025 CVE-2021-44026
Debian Bug : 1000156

It was discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not properly sanitize requests and mail
messages. This would allow an attacker to perform Cross-Side Scripting
(XSS) or SQL injection attacks.

For the oldstable distribution (buster), these problems have been fixed
in version 1.3.17+dfsg.1-1~deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 1.4.12+dfsg.1-1~deb11u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmGh/gYACgkQEL6Jg/PV
nWSv2gf9FLo2Qe4coRsW42ZmZXKnzpxKUpZC1TwFe758FhUl/2906yP1f4rKi5Ut
XE87aetT292vsM+STtlw87ZFbD1yQn2b4RfBF12+G84Qln5KGBlmjtfniU1vWafw
YrN8ZoSG879IY35oxQcLZcBMZanhjNsqVAuJiGPg8cKi0Un17shn8znf4u4D2hD6
7WyVEnYhBP2xXjA+U+FVGh+SiTDrd482iSl4gq/cJH4ig11L/qaWdCW0BPZT/Ppc
0FrZxW2R4W+54R6WFbA1qftQfMHNACi9XUlJTIwOi/7VfD1eM7dE+zw0lSB5JOMv
oNs9n1iAGWIBCB1Zf1kXOXbvyf5XXg==
=5tqH
-END PGP SIGNATURE-



[SECURITY] [DSA 4985-1] wordpress security update

2021-10-14 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4985-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 14, 2021  https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2021-39200 CVE-2021-39201
Debian Bug : 994059 994060

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform Cross-Site Scripting
(XSS) attacks or impersonate other users.

For the oldstable distribution (buster), these problems have been fixed
in version 5.0.14+dfsg1-0+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 5.7.3+dfsg1-0+deb11u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmFoP20ACgkQEL6Jg/PV
nWQGCwf+M9e2+WroFur6XdYPJejF6VQAFRwobyLFZOvy3c0HXNlFugNd8pP2eMT9
X1wHpv4fEbOCqsUepuJ5N30oBlJj5oEgOX4R0yNIwsB7xWlzzEamrpqcpjc9IklJ
Z7k9WPTEf1Clo6yIXHhRT3FlGM9lYlu0yuYwtLJf6vXOn3Ap3fUVbv5Xv4tCqqEl
33bmYbt7rFSkM5RN5tWAjtWS2rtxQR5xbZ7Y+303uGGwVfFWHPFuJo0hWWOx0JM3
qndCNkukwA4O2JAQcPtv3oN70kBiWbTKuQOvur4903qfMb4YUo5ga6lX4vwMDnEJ
PyGZe7XmsXJXRgK9GLXFzQeyygzuvw==
=Dh7P
-END PGP SIGNATURE-



[SECURITY] [DSA 4907-1] composer security update

2021-04-29 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4907-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 29, 2021https://www.debian.org/security/faq
- -

Package: composer
CVE ID : CVE-2021-29472

It was discovered that composer, a dependency manager for PHP, did not
properly sanitize Mercurial URLs, which could lead to arbitrary code
execution.

For the stable distribution (buster), this problem has been fixed in
version 1.8.4-1+deb10u1.

We recommend that you upgrade your composer packages.

For the detailed security status of composer please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/composer

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmCK4LkACgkQEL6Jg/PV
nWQhBwgArIovQUUooqTS91bHsjuqtP5cXvbbeSbLml9cRug6U83QJEeDOnLz/ljd
K0gZLZIHAi7B9iMX/oeSA73VYmSyfEp1DhSaluGSMkbvzptONDt6j/wKc23Zr/A8
C8/wcD1k4rIC3VmyEWNKtO/qZZ+nt/WX6Fpq4PrlOdhO3ea/hctzlz3UacVoThwD
HSHBHn5pWQygHQYdWva/HNeeEtwE81gBaQ3BYYJ+NWgZilfHW2pU5ilhWi2jur3z
nwgpqIKVhfhC3jG4552n15E5i5T28LR8IXfijtHr91b4Q2ZtVdKQdSYs8UO0+jA8
Lz0xVj6CyVNsrmXe3fMzkIVeIzA04g==
=2MWQ
-END PGP SIGNATURE-



[SECURITY] [DSA 4896-1] wordpress security update

2021-04-22 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4896-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 22, 2021https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2021-29447 CVE-2021-29450
Debian Bug : 987065

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform XML External Entity
(XXE) attacks, and access private content.

For the stable distribution (buster), these problems have been fixed in
version 5.0.12+dfsg1-0+deb10u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmCBDxMACgkQEL6Jg/PV
nWRHgAf+OMDCwkCIXn+tu7zdgvIDRQqGdXExm77wvoZRpJ2GFtNpQER9pFqdO1lZ
+TXN61DzEwMHt4ABeKrJp8mMjsIALdlKwZY4qnIGooTOwMDM2RXxCGzgIMLaLcZf
Qd3wyCCe51NiBNvA9UpUJQoakbhahxYhKAfn4HgAC9kEtC2DUPl3Br7YyCwyKK4r
m3LBVwkSgNBhtkLw7iAggVmiNTNEpO0j9Z7jNsE1c2hwFqh8Q9/U5N4C1y4XFDsz
U+tjzcA9VR51XDH/zIE7z8uWQRGMgNpN4/1n5F6uIRChdU0tbnRK3KmRoiHjIBWH
rLCg3cd0aLfQ/57wlIyzxu7ILlh2/A==
=odD4
-END PGP SIGNATURE-



[SECURITY] [DSA 4880-1] lxml security update

2021-03-29 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4880-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 29, 2021https://www.debian.org/security/faq
- -

Package: lxml
CVE ID : CVE-2021-28957
Debian Bug : 985643

Kevin Chung discovered that lxml, a Python binding for the libxml2 and
libxslt libraries, did not properly sanitize its input. This would
allow a malicious user to mount a cross-site scripting attack.

For the stable distribution (buster), this problem has been fixed in
version 4.3.2-1+deb10u3.

We recommend that you upgrade your lxml packages.

For the detailed security status of lxml please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lxml

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmBh/jUACgkQEL6Jg/PV
nWT4yQf/aLxTPSFTtdAjpJXH0yTcBTt5dIsodWLXwmWAzsOxA2ivUV44NL7oduQq
P20TQCtIUHqXrP7N9q4rCm+T9fIIdOFJckATWQkYUuk7/RQB4xi4npe2Jj1vgvjj
ELMtjoURYHhGvnJDLHqTgfsdIly+gnwKfyPAFpfbOQEb+2W3Ds3YjHF9toCtVc0W
6q5S7bTfkisLVWU3wWWwH1vTlA3XS9dgozUEIoV5TjGakQicnx6ZBA/zhEs4OJUf
Vr5W52nFrZRh0448htdKT+4ex+IEI8sOKegH/ecYmK4WBGrrMgYCxeWgB+tUEawz
68g5R3mwr9FtfkbLGBFlBk68Y1Ei5w==
=g+pG
-END PGP SIGNATURE-



[SECURITY] [DSA 4859-1] libzstd security update

2021-02-20 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4859-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 20, 2021 https://www.debian.org/security/faq
- -

Package: libzstd
Debian Bug : 982519

It was discovered that zstd, a compression utility, was vulnerable to
a race condition: it temporarily exposed, during a very short
timeframe, a world-readable version of its input even if the original
file had restrictive permissions.

For the stable distribution (buster), this problem has been fixed in
version 1.3.8+dfsg-3+deb10u2.

We recommend that you upgrade your libzstd packages.

For the detailed security status of libzstd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libzstd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAwxgIACgkQEL6Jg/PV
nWRqcgf+OvA7eeLqYuHuwtSD8e5xD5NIGGrOwcKkIRm/FtQx/ezBFwPwHzLT6MIx
snzDop6ANxRg5X6b1/6ARioYH6YdHQorcENZ7laO9wXujEThhPnkVNG8UK7HGK76
hWqgLbnr/LF3jc6aiFeX5zKMw8mbMzhCzouQnp5P4hVKchUuyuwyPx41XGFfUvXR
GeWKl9jlFuFdS8WDjhbGltheqjQUjQ25LnXkGOsc/XrjCvO+q3n7qP+0HLbkDnhe
Dqe9n7iQwvRLGNf6MXUL05zAzV8sAf5pbJGt00fS3O7zu9k/x5W5bJ8HsXMKUvVx
eRQUIpAJXVDe/1dmIZiUDccC6H1bhw==
=p1vr
-END PGP SIGNATURE-



[SECURITY] [DSA 4853-1] spip security update

2021-02-16 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4853-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 16, 2021 https://www.debian.org/security/faq
- -

Package: spip

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to perform cross-site scripting attacks, access
sensitive information, or execute arbitrary code.

For the stable distribution (buster), this problem has been fixed in
version 3.2.4-1+deb10u4.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmArtRcACgkQEL6Jg/PV
nWSwTgf/ZeebxmE8OnnCc1UxE/2Ukwr0lLVB3AfX5JcDT5eaFY3jipacdcdAVfnn
FfDBIc/S8dLHH8xqq/wLOgVtrKMwGXOILItRe4rDmA2ENCJc/f6OVAvtx7o3I4ar
/e1MxMLb+ZK5bgnIfm5J3GiHTMWQ69PodZ1Jd/Hu4plLXVLvO75GGRIOVwdhnLtm
MWxc7591tjcdgJetL6HXdqJnljWy5LLIA05vrkKbJWrqax2J0EnwIzGuENkwxqIP
VesQyes3sf5BV9dBaoE3wafRLbh7UpwlXfaoRk8wwR27dQ/OXRLhJhe/Of5apgR4
fYLTLN1bwl59vBYhqVHXE2vik/4R8A==
=Y96V
-END PGP SIGNATURE-



[SECURITY] [DSA 4852-1] openvswitch security update

2021-02-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4852-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 15, 2021 https://www.debian.org/security/faq
- -

Package: openvswitch
CVE ID : CVE-2020-35498
Debian Bug : 982493

Joakim Hindersson discovered that Open vSwitch, a software-based
Ethernet virtual switch, allowed a malicious user to cause a
denial-of-service by sending a specially crafted packet.

For the stable distribution (buster), this problem has been fixed in
version 2.10.7+ds1-0+deb10u1.

We recommend that you upgrade your openvswitch packages.

For the detailed security status of openvswitch please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openvswitch

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAqZqIACgkQEL6Jg/PV
nWSxAwf9Fs4AJekINCdGzSqrz3bBP3hpZj5otk9mVDcW6UC2yNcz+BUyxg81YB3m
0Fc8KGCaxp7bm5B3o/j8vzhs9JSBXdI9qZr72/5W7nWL5zqUdtptv4On4bChPq+6
MFn5Akaekkx/Fz25i33J859LHmn/8h9FXk/ADLRUdz+/iMintWG9mne39OXk8D3C
8Tp1zESGtitNbbq8YH7c4DsXA2kercBb22AqcE+2HClCaCGYaFi+xkLxwMpfbIVg
E0WjhmeqWFZuLzRAwnKlL+MaQT19IlDMump95VZbJ7wzp4I0FSgWsAJ0JpFPu5xX
btwIDA8LaoeZ7tnjYfQ/0bpx8dV9bA==
=mPSj
-END PGP SIGNATURE-



[SECURITY] [DSA 4850-1] libzstd security update

2021-02-09 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4850-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 10, 2021 https://www.debian.org/security/faq
- -

Package: libzstd
Debian Bug : 981404

It was discovered that zstd, a compression utility, temporarily
exposed a world-readable version of its input even if the original
file had restrictive permissions.

For the stable distribution (buster), this problem has been fixed in
version 1.3.8+dfsg-3+deb10u1.

We recommend that you upgrade your libzstd packages.

For the detailed security status of libzstd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libzstd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAjhKUACgkQEL6Jg/PV
nWSAPwf/ZV2EwzbnFKmdKqgIJRLghLQtO8hEt9e31sParY5AXk1vZ36UAhWKGaEu
Thu16wsnzmmyk/Fbc+B3E0LKzhaQMDFeO8cIl+jNSoWvfI++YJ/C/4M13JlM7oiq
PLsdjbQ5OjXDNeghFXb/jaa0zAJDB8m+0zHLZ9rP+YzCd1JMjd5/Tjius6CdDx6c
NFBEjwIMj9qmUzkNkjltQ5HBIWkM3WL1achZKG0nlInyLBTIio3kUY16A46PcusX
J7vrrJhfiBXalO+D0vNl2uUTYfcCBo8PrBGoTl1w25vJ21hNhFwuA4PLwhCVuMkk
RydYSQZruMXuhVSH56osGC0QK58hYg==
=5cdk
-END PGP SIGNATURE-



[SECURITY] [DSA 4844-1] dnsmasq security update

2021-02-03 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4844-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 02, 2021 https://www.debian.org/security/faq
- -

Package: dnsmasq
CVE ID : CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 
 CVE-2020-25685 CVE-2020-25686 CVE-2020-25687

Moshe Kol and Shlomi Oberman of JSOF discovered several
vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP
server. They could result in denial of service, cache poisoning or the
execution of arbitrary code.

For the stable distribution (buster), these problems have been fixed in
version 2.80-1+deb10u1.

We recommend that you upgrade your dnsmasq packages.

For the detailed security status of dnsmasq please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dnsmasq

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAZVA4ACgkQEL6Jg/PV
nWQYKAgAgVwonRAgXSliaFh0n44OPOz9wf4KibG7otcnAx4V4XqFAeXsHd/hIX/K
IC313F3I+8WzvjKBhvt2KnGG9SnoTnq4roBIa1nz//vNX0hyfDm5xPlxQOExzC+c
YS8kGt++SvC2wgOsrZEjyk0ecKqDJmZSwW31zXG9/2kTzCbKjuDp+i4TTADqabPC
AgbmEGVKBR2Fk7K9Prct27oWoj7LHMaH+Ttb8uQGnG7OgJs9KyRI+2qIu+VaRCGf
yfRj+XayPYHV1Amf5dLIKcLMMp/FnkNFoO2YIAZkWVPjXD2uPKUykJJ1GRl8R+0q
qtNhPTNNuD6WnYzC8yP0KIQ2tsbg9Q==
=j5Ka
-END PGP SIGNATURE-



[SECURITY] [DSA 4831-1] ruby-redcarpet security update

2021-01-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4831-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 15, 2021  https://www.debian.org/security/faq
- -

Package: ruby-redcarpet
CVE ID : CVE-2020-26298
Debian Bug : 980057

Johan Smits discovered that ruby-redcarpet, a markdown parser, did not
properly validate its input. This would allow an attacker to mount a
cross-site scripting attack.

For the stable distribution (buster), this problem has been fixed in
version 3.4.0-4+deb10u1.

We recommend that you upgrade your ruby-redcarpet packages.

For the detailed security status of ruby-redcarpet please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby-redcarpet

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmABkzwACgkQEL6Jg/PV
nWSUJAf/S5a13rCfo6KGpWr3h1YAyuUlH8pFdM3zytlvX7tLDZMIQon1OL0fKecP
lPDVE90EJoLBUUxdF1rSYWSQDS4fbCvSVuzcUqGrwgWvmEjL3rUTqaK189KB32sE
1wmGfqz0MS0ZBSAkPWLqkuMgRhP4SL2H78W9nssdLlC/eZ9G0kM1gTVOzQlrRVrc
BNKX73zMfwP2LREWXpjMCpu6IxfNHaIWQHjWbDwWb92qbz0LAnujExo0PoKWGsvR
5DSYS+rasHfUr8VWGopKMZQp4AfFBKH+oAG2qpPpwGwRda9bI88yfT6hXtctpfDz
kn5ERoIrC6OgXOEO9LnbLAUsEtCSSg==
=D3qU
-END PGP SIGNATURE-



[SECURITY] [DSA 4814-1] xerces-c security update

2020-12-16 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4814-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 17, 2020 https://www.debian.org/security/faq
- -

Package: xerces-c
CVE ID : CVE-2018-1311
Debian Bug : 947431

It was discovered that xerces-c, a validating XML parser library for
C++, did not correctly scan DTDs. The use-after-free vulnerability
resulting from this issue would allow a remote attacker to leverage a
specially crafted XML file in order to crash the application or
potentially execute arbitrary code.
Please note that the patch fixing this issue comes at the expense of a
newly introduced memory leak.

For the stable distribution (buster), this problem has been fixed in
version 3.2.2+debian-1+deb10u1.

We recommend that you upgrade your xerces-c packages.

For the detailed security status of xerces-c please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xerces-c

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl/bBZQACgkQEL6Jg/PV
nWQAVQgAidQ0lluHvaQwVsE82NY+pWaYDIBH+T23VKAhecLUmUJkB6SZy77FkG4f
36nHuZYm2W+a62OFTwRy3833+OZqgSw9Jdzr4756u5XDBiDRpOaDW99Ra68VJjZl
gh4svlRKUy9LWxeJxgZWoH5HitxOMp56EtsofHk/gdIRP7rRqG6k+mTNSnjjY+GR
wrYqfcuvyP3frP8KJGvm8bX4zlhg14w5WNbnj3pzbgUv0taCXonV/g3TFY/egEdj
wdiXo/5jhCwTAHuhMO+HWIWKuBPRIzYi0lrw1vCJL7YHgbwULYkqyMV1FEVp1FPB
H+HvGCQ7azQ4fAC2GH1x1UzqgxTKpw==
=/MaF
-END PGP SIGNATURE-



[SECURITY] [DSA 4798-1] spip security update

2020-11-25 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4798-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 25, 2020 https://www.debian.org/security/faq
- -

Package: spip
CVE ID : CVE-2020-28984

It was discovered that SPIP, a website engine for publishing, did not
correctly validate its input. This would allow authenticated users to
execute arbitrary code.

For the stable distribution (buster), this problem has been fixed in
version 3.2.4-1+deb10u3.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl++DaEACgkQEL6Jg/PV
nWRStwgAmZChNL7iGrRO5UAyAbws/zbEcP+WGF1JeaftlRPbY8+/ZSc4p07EVAcH
C8qRHkv1Oor+UFa4LFxdIbof5Q5IgnBAz1l2ts5PWv3OxO5CGPi9/l0rpZDWsPFw
uv+WmFvdEOF1hwq5CsPfc7SKA1ZX2pZs/q+uXAbiHGO8n+r/HR5Pv1gWd7kIESA9
qhSlDchTEtBKi+YLuAtaO2xMFOFdAxRydDjdqSOwHBYIXwgUOrqVBJKn/mMqjdUv
zO+0NpZNU14mB5jL5/f6HFwUVwSIio5BsGk3kVqcnzO3z+ikfQuWkoGTf4nSZmLN
2GSpLYNS2oCzHnCeDcHCXjyERRGf0Q==
=69gM
-END PGP SIGNATURE-



[SECURITY] [DSA 4784-1] wordpress security update

2020-11-06 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4784-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 06, 2020 https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2020-28032 CVE-2020-28033 CVE-2020-28034 CVE-2020-28035 
 CVE-2020-28036 CVE-2020-28037 CVE-2020-28038 CVE-2020-28039 
 CVE-2020-28040
Debian Bug : 971914 973562

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to run insecure deserialization,
embed spam, perform various Cross-Site Scripting (XSS) or Cross-Site
Request Forgery (CSRF) attacks, escalate privileges, run arbitrary
code, and delete arbitrary files.

For the stable distribution (buster), these problems have been fixed in
version 5.0.11+dfsg1-0+deb10u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl+lSYUACgkQEL6Jg/PV
nWStuwgAoDBZA5FLY+lIr5ioN46PD2SzjnNwBsyyBHHdu81Lbrid976RVFUfUsex
AtTQGIbDG3lr3DSL0lzwQKikgRnTHDO42PwP+dATpK3yH0sjr8xSSr3rqVITz+iB
qQVWc2UqHR+zUUbxoa6/W2V9y+zqVmm1BDvkIlbHw4x2m8/ErhrEo8FR9C3105I0
DdzQXxSFEEK6l/090I7gGtXIFHa9izk8AQ8pgytBTUAveWE/sLWdF1vHDfQhb3FY
HSPs/uzVvbLBDDfwr8xRWVjkL8kyism5ynmRwqtE+AiMqDWSVGlADdcZtcsyUeDt
WpOwXIdWwNIPrpalNbLeO/Bu2apvWw==
=Jo4W
-END PGP SIGNATURE-



[SECURITY] [DSA 4720-1] roundcube security update

2020-07-08 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4720-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
July 08, 2020 https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2020-15562
Debian Bug : 964355

It was discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not properly sanitize incoming mail
messages. This would allow a remote attacker to perform a Cross-Side
Scripting (XSS) attack.

For the stable distribution (buster), this problem has been fixed in
version 1.3.14+dfsg.1-1~deb10u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl8FVgUACgkQEL6Jg/PV
nWQvaAf/Uvl0F1+NiavrKStZYhfeCcMI2VkAIJZvB4RDHwK5lJFnnVTMopk4eMWB
tqmCcHXEwmo1Knt7uFWgmjcCxLj1N0q9Vnmed6GuLbxrQxLik/8K7SMfb4RlVtC7
SwRGYiQ8uaP04q3GAyd5Fqvn5gw/Ypo3bMo5+sZdiRWFM7+S0V8vS9pnB4jTK7b5
5CSdPhhDOlANzmGILD/+OvXtIYqN0DP+FuKpcXY7b2ZeOLSGj0CjsgThPH+ZEA6p
e5XgCODlbo2HCQe/4nicpfHiqZUHDKsCyD3/pvil7mnAs/Tw6pvKqYqZsk6x6w5f
yMdcuowe7kRl6Q0Tzbnc6M+iR1dn8w==
=CMjd
-END PGP SIGNATURE-



[SECURITY] [DSA 4709-1] wordpress security update

2020-06-23 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4709-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
June 23, 2020 https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2020-4046 CVE-2020-4047 CVE-2020-4048 CVE-2020-4049 
 CVE-2020-4050
Debian Bug : 962685

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform various Cross-Side
Scripting (XSS) attacks, create open redirects, escalate privileges,
and bypass authorization access.

For the stable distribution (buster), these problems have been fixed in
version 5.0.10+dfsg1-0+deb10u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl7yDbQACgkQEL6Jg/PV
nWTZXAf+PZSkdoSO/XhkZQBbyPAnd6FCh4e07gATBVe9RCThA0rAlQjnJRXyXO10
Q2BMm2kq/5HoNODsY2sasEQJTmNVEFPEF44sMEjpSbuIU3Nskj5eMEp7ggBftkd+
mW+hnIoY4iKHroitrUjKcy/skUBOxvP8B6Saa4k+DCj6fMCCKlvivFiVt+fS6GDt
4hxMcylcPu7sCOJZh/UBgxNlUTRisWN4KZbBjRhoHaXwsZM17F58UaKnzfIIZfOz
xA+AJUxiknUszEsSbUFDZRtPrLIYNUXXRyD8KQgn5EnASzppn9gqcwS7DpvfaO2U
TY4mtso8d4eKc9Do64UR7fdHQZf31Q==
=DmH5
-END PGP SIGNATURE-



[SECURITY] [DSA 4705-1] python-django security update

2020-06-18 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4705-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
June 18, 2020 https://www.debian.org/security/faq
- -

Package: python-django
CVE ID : CVE-2020-9402 CVE-2020-13254 CVE-2020-13596

It was discovered that Django, a high-level Python web development
framework, did not properly sanitize input. This would allow a remote
attacker to perform SQL injection attacks, Cross-Site Scripting (XSS)
attacks, or leak sensitive information.

For the oldstable distribution (stretch), these problems have been fixed
in version 1:1.10.7-2+deb9u9.

For the stable distribution (buster), these problems have been fixed in
version 1:1.11.29-1~deb10u1.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl7rKgsACgkQEL6Jg/PV
nWQUpQf/a6ouTulgXuSAegdWfc6ehpmZVgKb8Ln6K9lqvHsvYQyNQVjI3Loj+Squ
Jw5n0gXf/n3uW9/gKlMC/gKVie/ED7STZFgFr5k4xMvFcXiTE1V9ljv2eIQjCh9o
YtT40NCCM1oTfVemsaoyUJ5rtr5nFznY3R8yf9Rdlq7I5SZGw5BdYHaUbSKutwIp
OnrjL+VscoMBffgtaJY6/tQyMwOPiu+xynUCKEfaMHRuwwHl1+rj7gr+HRImQhTX
7FezQOxpvLPrh/tj/4DdQ6VMG1ClOCPvISGuZ1mhnMHcHy2KzA5OtoWRnVks7udG
h/WYma9kPi3CSSYNWzEVTknN/wQwxA==
=7/E0
-END PGP SIGNATURE-



[SECURITY] [DSA 4700-1] roundcube security update

2020-06-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4700-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
June 11, 2020 https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2020-13964 CVE-2020-13965
Debian Bug : 962123 962124

Matei Badanoiu and LoRexxar@knownsec discovered that roundcube, a
skinnable AJAX based webmail solution for IMAP servers, did not
correctly process and sanitize requests. This would allow a remote
attacker to perform a Cross-Side Scripting (XSS) attack leading to the
execution of arbitrary code.

For the oldstable distribution (stretch), these problems have been fixed
in version 1.2.3+dfsg.1-4+deb9u5.

For the stable distribution (buster), these problems have been fixed in
version 1.3.13+dfsg.1-1~deb10u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl7hzMIACgkQEL6Jg/PV
nWR6HggAmeyPEJAP2BZGXhDCYvEPYERHrJ48bIINNS03qmlkdqfsnfVuwHRzcouR
QzlcPAs3vk1dCbzQYy2Jke9F4ihKersDN9Y919/EZSuaaTq0h5zm9M9Qkib+AqV+
rKTbG/LmLDCPU4krZTYUseZZBpsUcRn0lshfALUigCUKOIwvTsoUjaOy5bdRGG7t
qsKPXYq52gKZWGH0vDuXdcFzgS31OCLtXNNEManR3jzuTxZtqSOzOsKUHzzs1raO
9o7/vn4bg00BFrN6Lzysk6U3DFFf9MMhhSVFFnbY91P5s60wGGuo3osIBWQlw0PJ
++3+RHCsV7bjZut2RBzOiocVeCXSBA==
=wJd6
-END PGP SIGNATURE-



[SECURITY] [DSA 4677-1] wordpress security update

2020-05-06 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4677-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 06, 2020  https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2019-9787 CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 
 CVE-2019-16220 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 
 CVE-2019-16780 CVE-2019-16781 CVE-2019-17669 CVE-2019-17671 
 CVE-2019-17672 CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 
 CVE-2019-20041 CVE-2019-20042 CVE-2019-20043 CVE-2020-11025 
 CVE-2020-11026 CVE-2020-11027 CVE-2020-11028 CVE-2020-11029 
 CVE-2020-11030
Debian Bug : 924546 939543 942459 946905 959391

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform various Cross-Side
Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create
files on the server, disclose private information, create open
redirects, poison cache, and bypass authorization access and input
sanitation.

For the oldstable distribution (stretch), these problems have been fixed
in version 4.7.5+dfsg-2+deb9u6.

For the stable distribution (buster), these problems have been fixed in
version 5.0.4+dfsg1-1+deb10u2.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl6yWNIACgkQEL6Jg/PV
nWQnpQgAtGmkFfRTwb2uDsBuHilQxyPcVXVzZZ8AZM3oWxblTP2NNHRTAm4cRLwB
M7OnCtl2+0fcsPS/bVJioogwoaqQvFHUUl5cR8jCYUS+hSWwBzd6o70Q4ENXqHEz
5eaF9fhevs03YbZw4F07dN3b1rcc0NrVUqBR39zJVKZyD9syK3auNzLtuyM7vKI3
/03MojNXB5UvQeRGj571fKr6kS+eE0Bd2ojcBzGLvzjRgILAahc7dfyNoaBbvq73
j0/PKTBHtfEanpFsp02FkAX5ScY3D8ixymV/W0eEoq7xYdG36Tv7pJAAMAEJLouN
axH8DQPpff2Y+6EQnOrfWBa8IHm99A==
=itB2
-END PGP SIGNATURE-



[SECURITY] [DSA 4674-1] roundcube security update

2020-05-05 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4674-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 05, 2020  https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2020-12625 CVE-2020-12626
Debian Bug : 959140 959142

It was discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, did not correctly process and sanitize
requests. This would allow a remote attacker to perform either a
Cross-Site Request Forgery (CSRF) forcing an authenticated user to be
logged out, or a Cross-Side Scripting (XSS) leading to execution of
arbitrary code.

For the oldstable distribution (stretch), these problems have been fixed
in version 1.2.3+dfsg.1-4+deb9u4.

For the stable distribution (buster), these problems have been fixed in
version 1.3.11+dfsg.1-1~deb10u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl6xabwACgkQEL6Jg/PV
nWTu0AgAzQr+2TTSuGf66vYe+mLC/iZnpoVI8LwZHgoR0L48TQpcQJ95g+SkeEfy
tqoGy4o5aMMY5tnN2StKq4E/CH2RNjUie9lajTkrZIOQpxX3yOZd+VvkPSZxDEJw
8Tr5a22iQwo2WmAkYAMrfVeAXTw3XOufNRQm0PuTFGkx66vpwLgsE28rlbv4DRaX
mHUxpPhj/PpNBpGc/Zhpj61qTgTUNaMUUIf8z5Qg1f4Kx6aLfmmRyaF8BBtPpIaQ
gBuOr6P77ZlAOurdB6keV0HiBdVZLEgbUk28Ll/g/h1dtCOmIlHxeqlaNwQ5oonO
3+6hq2VdoicnWweisEBFGwwRJWtCwA==
=exy5
-END PGP SIGNATURE-



[SECURITY] [DSA 4660-1] awl security update

2020-04-21 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4660-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 21, 2020https://www.debian.org/security/faq
- -

Package: awl
CVE ID : CVE-2020-11728 CVE-2020-11729
Debian Bug : 956650

Andrew Bartlett discovered that awl, DAViCal Andrew's Web Libraries,
did not properly handle session management: this would allow a
malicious user to impersonate other sessions or users.

For the oldstable distribution (stretch), these problems have been fixed
in version 0.57-1+deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 0.60-1+deb10u1.

We recommend that you upgrade your awl packages.

For the detailed security status of awl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/awl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl6e23sACgkQEL6Jg/PV
nWQCzwf/WQHLwG1K3u69Y0zAMKUyN7/aAaMKXvejPG/ufJ/bkNLNpkMSHYa0viM8
C27bAE04UzHcpd+xERqjJPZsqBhQB80BBH/Cf0hXlw5dzBYubVwUlJ8JymHR9gA0
yAnT53N+0QhAEU2xuo8Q25M/0mq371bTPoVmplBEIvJkL22Gv0fnyEmOvNnAMHu1
CAJuDiqB/Uw5qcmYiQCJakyMxL7qPeZvzgmrr+9EZPz1+yVAGAUo52FfMJpVkEMn
Tfxx2APvPOzz84AZ5M7s/sei+jDNI2HuGHoYnFfygtxQSLAKKdL0TIGGtcbl5f5B
xNdI4ZFotRkGXwwc/ookymwqDFULfQ==
=BTC4
-END PGP SIGNATURE-



[SECURITY] [DSA 4649-1] haproxy security update

2020-04-02 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4649-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 02, 2020https://www.debian.org/security/faq
- -

Package: haproxy
CVE ID : CVE-2020-11100

Felix Wilhelm of Google Project Zero discovered that HAProxy, a TCP/HTTP
reverse proxy, did not properly handle HTTP/2 headers. This would allow
an attacker to write arbitrary bytes around a certain location on the
heap, resulting in denial-of-service or potential arbitrary code
execution.

For the stable distribution (buster), this problem has been fixed in
version 1.8.19-1+deb10u2.

We recommend that you upgrade your haproxy packages.

For the detailed security status of haproxy please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/haproxy

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl6F5I0ACgkQEL6Jg/PV
nWQPtAgAlebr3o7KaSYcMAfJCsEzCJKPT5tqk+tpcELkDjm3XJgXh8o8+pUfz4x8
I/cz/+sDy6CsSLUrR0699PH9c1EYwhfkyeqxaPg0+BrjSarIAkkJVGIjdSS9in51
ws+JwEUEncLku26MnZO81Ju6HM/tsw+2FitOMYwyU34qrwyaggtD6JBlZjfqk/7M
71YQmYASrWxUwYh3GSLlHC8u3BDyTD/aU8xbgn85LIwX6uXYl/V4iI9DzR3pk5cr
7Flylu15T/W4+7iQ0QSmGgMVPJp4G6Koi2Lj0LiorGIc4L8iq8EpGvjU3t9sBig6
q9nPtEOTeL7QSky9m1sKFjcLgSfGoA==
=31YW
-END PGP SIGNATURE-



[SECURITY] [DSA 4629-1] python-django security update

2020-02-19 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4629-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 19, 2020 https://www.debian.org/security/faq
- -

Package: python-django
CVE ID : CVE-2020-7471
Debian Bug : 950581

Simon Charette discovered that Django, a high-level Python web
development framework, did not properly handle input in its PostgreSQL
module. A remote attacker could leverage this to perform SQL injection
attacks.

For the oldstable distribution (stretch), this problem has been fixed
in version 1:1.10.7-2+deb9u8.

For the stable distribution (buster), this problem has been fixed in
version 1:1.11.28-1~deb10u1.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl5M7iIACgkQEL6Jg/PV
nWSJnQgAx6apWFroZ90PoqfwIGZOFIwZBOmQqkUEBDXWr7i/mVA8m2G+rrj3nFem
71EK+b+T/CUgku1DmtANB0d/e8Kb8HVFjd1N9B6tyoB90xGGLbOFJTQn+owdgsCs
nJb4mZUYCsZ2Kk8cyJvsk2x1uMo9bAGGqZs5shqG2VsyfjifC3BUGeB+9KTR+bXP
wBFcq00ZFgFWiKsxl/CwiYQCn5uk+24Hd/FCuhp4v3yr/HmOtwnfMS9I0+u0c9ep
ThM64NRH/FKyXfcGgiJFi4ifD2gFWkgJhe9326ZHf4ruGW1/rtPv8rl7+2lg5AMX
RKkXSLkv8Sd+GG3QK+1dHHwoQ3Ey9A==
=f5GS
-END PGP SIGNATURE-



[SECURITY] [DSA 4599-1] wordpress security update

2020-01-07 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4599-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 08, 2020  https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 CVE-2019-16220 
 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 CVE-2019-16780 
 CVE-2019-16781 CVE-2019-17669 CVE-2019-17671 CVE-2019-17672 
 CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 CVE-2019-20041 
 CVE-2019-20042 CVE-2019-20043
Debian Bug : 939543 942459 946905

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform various Cross-Side
Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create
open redirects, poison cache, and bypass authorization access and
input sanitation.

For the stable distribution (buster), these problems have been fixed in
version 5.0.4+dfsg1-1+deb10u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl4VbEIACgkQEL6Jg/PV
nWQ02gf+J2wZhdpxWUvi8VXLjIlfT5maSOGgBDNzzmXcrBoS09uteLz+6MJ2RrLt
2AkmKzHHwjkHcrksBPai6pKxPl8kGMNvfoq3myZZSLANIpvUSIJP4ZyVFwpho8lZ
KGyKqtOehDeQOo4tRZoVuGGXuPePZ69FLhsQ0o1V27t6UFHLap7vWCDquRZvMeer
kZ0emVISeQeVGZyjmZ+o9V+n2BcgRFidWLw49OqRjdPb7rac/3PmunelsOkvb3a+
OvpzAvjb+78CBAl6VsX6LHKXQvjseRXtTHRRea+cxgJYreLc/M/G/NCojHkw9L8I
H0nJEe6KUU+jVW4X6GKkAm01eeomTw==
=wSuy
-END PGP SIGNATURE-



[SECURITY] [DSA 4588-1] python-ecdsa security update

2019-12-17 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4588-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 17, 2019 https://www.debian.org/security/faq
- -

Package: python-ecdsa
CVE ID : CVE-2019-14853 CVE-2019-14859

It was discovered that python-ecdsa, a cryptographic signature library
for Python, incorrectly handled certain signatures. A remote attacker
could use this issue to cause python-ecdsa to either not warn about
incorrect signatures, or generate exceptions resulting in a
denial-of-service.

For the oldstable distribution (stretch), these problems have been fixed
in version 0.13-2+deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 0.13-3+deb10u1.

We recommend that you upgrade your python-ecdsa packages.

For the detailed security status of python-ecdsa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-ecdsa

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl34+5QACgkQEL6Jg/PV
nWThYAf+PH/Het1sH5n/p+JnC9ys9BjbJw/bUrXl0RYx812cWlVo4wWkAyjS9xD/
q0tR8Gx2wqAEauGa8Vy8H2hP8iW82+lCGlOoWNMqpVE+x1fwTLA8GCwH6f/UBrPC
5UJv06X6WYtrp3l3NKnq5IOR4QmWIVg3+gmrlm+6wC5NELwOCg0eH79vy+qtbc0w
7LaEI4IOi7yz11sXo7O0vu31S70EiwzRW6kyjlLfOrPN2OigiKYOkdAbWUocnSkR
Uy/LlLCYZry60wbUu9adOz/MOib2Bc9ARzskPrTPUQ0JgrZT1kiUIFU18mmVW9ym
qD3fYFLisZQT0hcu1C1D+UDfAVrpQQ==
=CvMQ
-END PGP SIGNATURE-



[SECURITY] [DSA 4577-1] haproxy security update

2019-11-28 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4577-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 28, 2019 https://www.debian.org/security/faq
- -

Package: haproxy
CVE ID : CVE-2019-19330

Tim Düsterhus discovered that haproxy, a TCP/HTTP reverse proxy, did
not properly sanitize HTTP headers when converting from HTTP/2 to
HTTP/1. This would allow a remote user to perform CRLF injections.

For the stable distribution (buster), this problem has been fixed in
version 1.8.19-1+deb10u1.

We recommend that you upgrade your haproxy packages.

For the detailed security status of haproxy please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/haproxy

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl3fgqMACgkQEL6Jg/PV
nWTypwf+P8rTp1L2+ARcbZM3Q54m1k4CL3lsMLMA6lcaCGZzyYKjXco59yESQUAz
lZw8hhAB1Th6UWFtHv8HeJsn7ltPFZc/vqpyhqpYqXLTNEJedx720Wf6bq5QTdSQ
XpIGc/epahu7z7rgCNS26DB7HPIXiHVMKTMC0+kTlIHhos1n8JustEjXt/QthVSN
NQdjCPD63k6Fp0fFboJ9+5PEpklqJBN/B63QiIKKWF+8BlPY/oN1INybOD11mPu6
mhO7/0ZgaElGHbtcaNse0PA7ukPgS3Pgzctykg676RKFvwiWD7qanAgIwY9qEx3u
LF4ifS25LWF3bz+owGLTccFuuRg+hA==
=J7cs
-END PGP SIGNATURE-



[SECURITY] [DSA 4544-1] unbound security update

2019-10-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4544-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 16, 2019  https://www.debian.org/security/faq
- -

Package: unbound
CVE ID : CVE-2019-16866
Debian Bug : 941692

X41 D-Sec discovered that unbound, a validating, recursive, and
caching DNS resolver, did not correctly process some NOTIFY
queries. This could lead to remote denial-of-service by application
crash.

For the stable distribution (buster), this problem has been fixed in
version 1.9.0-2+deb10u1.

We recommend that you upgrade your unbound packages.

For the detailed security status of unbound please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/unbound

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl2mqfsACgkQEL6Jg/PV
nWQBsgf/c6HwDSoTktM6V9P3xQ2jD73LNJBryf9W2enfZhFhsU2n4k72XjjBQlK4
N0aMNU5GW8NK9gQCi1rZMhinfORdiZc+Dq8rHfkvoTIOZRoqSrowKdXysjj677Pu
XzGALAc1Zwjhbtj4p+DCbtn9hr+RAq7GVRWMRxsjGTxEzGQe1bawq4McVVUSuV/p
HP8axuA4w8MtbyZ247q/IMBfVjmQjataBj22xyQ2nr8pM1rhwaw59y6toMg3l9+U
2ktJ4VzabkegRuzdIhpnK2K0wueU0DQT9dNh5hPg5rNTq8FOAxSUO2GKixMQeS1/
UIv3zV/9j9Yng1qaBciHq7KZNudjzA==
=OdTA
-END PGP SIGNATURE-



[SECURITY] [DSA 4542-1] jackson-databind security update

2019-10-06 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4542-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 06, 2019  https://www.debian.org/security/faq
- -

Package: jackson-databind
CVE ID : CVE-2019-12384 CVE-2019-14439 CVE-2019-14540 CVE-2019-16335 
 CVE-2019-16942 CVE-2019-16943
Debian Bug : 941530 940498 933393 930750

It was discovered that jackson-databind, a Java library used to parse
JSON and other data formats, did not properly validate user input
before attempting deserialization. This allowed an attacker providing
maliciously crafted input to perform code execution, or read arbitrary
files on the server.

For the oldstable distribution (stretch), these problems have been fixed
in version 2.8.6-1+deb9u6.

For the stable distribution (buster), these problems have been fixed in
version 2.9.8-3+deb10u1.

We recommend that you upgrade your jackson-databind packages.

For the detailed security status of jackson-databind please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/jackson-databind

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl2ZpPgACgkQEL6Jg/PV
nWTg1QgArRk3fUf/k14rPha6GlJnWtRu2tZli07NzxtebAI2Ra8vKHkv1F3xSBjx
tnauaRmJXonoU7t1TU51O/F7xkxX10NXym3YyrJ4+5ac6OtGmstSkMW1CmEiS8Z7
RaQQqY8GTJe5VTjiPon+lvdxyoFIDbp3nUGj8sshrULtKQX3Bjc9dotXyu0M3/7o
QjsFAOLpytx/nMS1O93rqHuO381plbaAi5EYgAPv737tV8lVH3li56FYTKRMVjEg
BkBpkaDGWhqoYvTu4WviyCyon0V5PgtHuD8SkN/39QqiYoDCzfa0xPjZ3a44G0kR
C6qF8E4WIw465wLrRLCuuybG6/ZrzA==
=Gifd
-END PGP SIGNATURE-



[SECURITY] [DSA 4498-1] python-django security update

2019-08-12 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4498-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 12, 2019   https://www.debian.org/security/faq
- -

Package: python-django
CVE ID : CVE-2019-14232 CVE-2019-14233 CVE-2019-14234 CVE-2019-14235
Debian Bug : 934026

Several vulnerabilities were discovered in python-django, a web
development framework. They could lead to remote denial-of-service or
SQL injection,

For the oldstable distribution (stretch), these problems have been fixed
in version 1:1.10.7-2+deb9u6.

For the stable distribution (buster), these problems have been fixed in
version 1.11.23-1~deb10u1.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl1RKSsACgkQEL6Jg/PV
nWSP1wf+Ik+YEcDwjJeK/QW060xu3WA4Y+TE2PYFkgtJSL9+wkDDPA2U82aHpVD3
hn253cl//sBYsTTFC/UwpW+y6yP+FmczdxQt+jTLyeKzq/tOZlhkutLHwrrw4OEB
e8XE0BhrwSFWInnkLxjjtCscHr6AA1Jt2GuVnhe6isZpbmvxHDNUDPHXRcVU7reX
l0INrcv43XIqcxYzNAQFLQKWzv6PzJcUsQJgvnbtW90pQCxp7UwW01H/Wx7FVfBn
78qbXWp+wRewGsJPv7Kjy6keUSck2I/ew0+X6efYAez/X1vgakp3/NGWMh2VzM8d
DdW2RhKU/PTEFe9t+1gTXhR1ZbOXZg==
=tCmt
-END PGP SIGNATURE-



[SECURITY] [DSA 4441-1] symfony security update

2019-05-10 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4441-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 10, 2019  https://www.debian.org/security/faq
- -

Package: symfony
CVE ID : CVE-2018-14773 CVE-2018-19789 CVE-2018-19790 CVE-2019-10909 
 CVE-2019-10910 CVE-2019-10911 CVE-2019-10912 CVE-2019-10913

Multiple vulnerabilities were discovered in the Symfony PHP framework
which could lead to cache bypass, authentication bypass, information
disclosure, open redirect, cross-site request forgery, deletion of
arbitrary files, or arbitrary code execution.

For the stable distribution (stretch), these problems have been fixed in
version 2.8.7+dfsg-1.3+deb9u2.

We recommend that you upgrade your symfony packages.

For the detailed security status of symfony please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/symfony

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlzVGW0ACgkQEL6Jg/PV
nWR+Swf/XR9Ub4ALHbkYsZGArd1oOOr0nAWmI718ZyTNQGj9Hl5gl0NoNjRgkeD6
nY9a+H/6+aJSgVTugGbJ4CavJ0ecaHlBawdW+DvscTN3z9tqiE21/TpEaQWq95F9
o1sUhM5dlWkRwAHVPIuQyzrGJ3aLz+F4HBV7Z9WMU6AADHq/Q2AKysNXbxnvObsA
SUBWr5iExXxsXXE+ftZXde13frMIB4MZDYGkYO0FMV5333T9QiPWHr3g4S7Lvlir
D7IzOU3A1miIAafDdhCmDvTJMToL2dj4+coP1sQwUNz0WT5TDS0Tv8neJ5cUwEQO
RkaysBU+O9U0VxHrkhP3nRgvMuYVdQ==
=0n6N
-END PGP SIGNATURE-



[SECURITY] [DSA 4429-1] spip security update

2019-04-10 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4429-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 10, 2019https://www.debian.org/security/faq
- -

Package: spip
Debian Bug : 926764

It was discovered that SPIP, a website engine for publishing, did not
properly sanitize its user input. This would allow an authenticated
user to perform arbitrary command execution.

For the stable distribution (stretch), this problem has been fixed in
version 3.1.4-4~deb9u2.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlyt4CQACgkQEL6Jg/PV
nWTphwf+MnTEngHeGlCl5zusQHd1uYBcrdQeujBcUejnIjIYmdp8RHS68JhyAi4n
XyKnVVMP7FCrZ6AmVOkAO03ci/gp4m5S8gS+1o5oEJzgdEQYthzmaxJcDysMIRcQ
qw/vheQeEulozifpM7aM1lFmr1tXoj06iyPp8/4c4zajiLI/dVYI4SI8Ft+Or+UD
TDK2NPZeS4kd6awuzqtTsXV0L3Li1mR6zYW7jAaWTG3OYlzRf4N+5ycCWs91ug01
VBtlI/DrsMhNZzg0MWNONMjdylJts66MEjVyXiDQEw+3gscEh0s+f+Q8z1NmE5kt
eLHakSNknXhpI9jvEq2nlMX/535iBA==
=fQ0j
-END PGP SIGNATURE-



[SECURITY] [DSA 4427-1] samba security update

2019-04-08 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4427-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 08, 2019https://www.debian.org/security/faq
- -

Package: samba
CVE ID : CVE-2019-3880

Michael Hanselmann discovered that Samba, a SMB/CIFS file, print, and
login server for Unix, was vulnerable to a symlink traversal
attack. It would allow remote authenticated users with write
permission to either write or detect files outside of Samba shares.

For the stable distribution (stretch), this problem has been fixed in
version 2:4.5.16+dfsg-1+deb9u1.

We recommend that you upgrade your samba packages.

For the detailed security status of samba please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/samba

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlyrA9kACgkQEL6Jg/PV
nWSvLQf+Mce+c49AVUGwYVjnVN3TgXbrgVI2lmWDwGIBdh/Kygg9Va3v66nW5pwH
RyjmOOIn9nTgxMFPeO7gdk3ui8mL7lJ+KEKPySAXpGy3BlruB8qBSdpSnNOzjyQA
K0cLbOrARly5q/HYgNx5CM5E/cqX5xFnJidmwbwwccvy/f1cgAmnZfSkCHTAri01
7X0xZRm2nlfFAGWZEOEkyEKRPxNeP5WpCikdC+z6+5H6ezVPr57lO/1IhI8i9de+
KpGGx9LSbEAfKAyuv1BVlSugsQ4mGYB7oEiTCEU6tS46Tyb7kG2gaouRUBXqBjFZ
sG4By7dtaEc+jwQVK3MZriMrePZOeA==
=6GCj
-END PGP SIGNATURE-



[SECURITY] [DSA 4424-1] pdns security update

2019-04-04 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4424-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 04, 2019https://www.debian.org/security/faq
- -

Package: pdns
CVE ID : CVE-2019-3871
Debian Bug : 924966

Adam Dobrawy, Frederico Silva and Gregory Brzeski from HyperOne.com
discovered that pdns, an authoritative DNS server, did not properly
validate user-supplied data when building a HTTP request from a DNS
query in the HTTP Connector of the Remote backend. This would allow a
remote user to cause either a denial-of-service, or information
disclosure.

For the stable distribution (stretch), this problem has been fixed in
version 4.0.3-1+deb9u4.

We recommend that you upgrade your pdns packages.

For the detailed security status of pdns please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlymLHkACgkQEL6Jg/PV
nWTsFQf/RvbsyjaPK20oiJxitB+O3GFU2ucUrmnjQ62lJqhDcoK/rnSpRAISvTKA
TjnbAu59/RcwnDzJMTInYrdeSq1r2sV528xV8DzpYVW21xCGGcSHA4cvWL5OVG3z
gnc/9TfkxWQkVy9o+rQukko7o2sU0vI6JUgxbA9llAhoxcII5+TmwLNEDQTL8gi4
1ljyIhTJnRMx5Uhtljp2Cr/uqZiJQTsSxqMuF+XIC62o5kSK2wCeuoRhwvWJHn4R
Xvt5ENd6rnWnuVjazG0eSAyfasNXepYmtED/crjITS2PxhV07UJqJHvxyov9QyWD
ZsnS4+Q5jwamwxGyMMtmMaiRn9Dr7g==
=Ieqy
-END PGP SIGNATURE-



[SECURITY] [DSA 4401-1] wordpress security update

2019-02-28 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4401-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 01, 2019https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2018-20147 CVE-2018-20148 CVE-2018-20149 CVE-2018-20150 
 CVE-2018-20151 CVE-2018-20152 CVE-2018-20153 CVE-2019-8942
Debian Bug : 916403

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform various Cross-Side
Scripting (XSS) and PHP injections attacks, delete files, leak
potentially sensitive data, create posts of unauthorized types, or
cause denial-of-service by application crash.

For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u5.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlx41ugACgkQEL6Jg/PV
nWS2yAgAxfm5TQM+zRiBgU9XSyAnWRCR2pTaAkZkuIggFOiBUa5/QNy8LgG9l2rX
fCrymLvKR6c9MP/via6hvB8JW6Hos6KgoSOON2zZ/1XnYawNQFWGkUudkX4QFx/w
DIdsBmnVfjTELJYQDJsdfOefngkMFX7vSiaAOf0ya5Qtj5sD4cACork0ngE5Gu8h
EGGbataSIhL/C1aisJIvEfWJykvLGjcgd696AKPUiC2dnUdk21CfMYj6YEJQXFBB
U+TfkL3aFZHBwIgKH7SkDL1yTpHbSJAGNvPK1vEyOfhIrkK1f2B0Gu4zRyIVnFXW
vXhaAeHwJ5TI74RmY+cbw3Hfu7lG1Q==
=NCjS
-END PGP SIGNATURE-



[SECURITY] [DSA 4389-1] libu2f-host security update

2019-02-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4389-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
February 11, 2019 https://www.debian.org/security/faq
- -

Package: libu2f-host
CVE ID : CVE-2018-20340
Debian Bug : 921725

Christian Reitter discovered that libu2f-host, a library implementing
the host-side of the U2F protocol, failed to properly check for a
buffer overflow. This would allow an attacker with a custom made
malicious USB device masquerading as a security key, and physical
access to a computer where PAM U2F or an application with libu2f-host
integrated, to potentially execute arbitrary code on that computer.

For the stable distribution (stretch), this problem has been fixed in
version 1.1.2-2+deb9u1.

We recommend that you upgrade your libu2f-host packages.

For the detailed security status of libu2f-host please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libu2f-host

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlxhdxAACgkQEL6Jg/PV
nWSRdQf+Pt+y/MxE9ugOhakI80frcv8zTVYjE1PDu8ZvP6TjJDUT354O1njS05iX
bYgw+PCHORKSvDIiwisMUFFqN6JdtWdweGyk+CyKO2pa4PLaQKXoTHSqfkxgSk5+
7bykv5KgxfYLHFs3WewW2ZjC0TMcLMNr8u6uW0i9gWC8r4cnvZP7ftpUFdTfCcvj
lFVLBGDBB6cS4dX+ZkMxtzJuyXE4JzIlLCECKJTYPeEGDxJLwd6v2MEgqKYswF1J
+50VqdWi398+4koamrpAt1YnRK/QPYknU6Sfir++MuONPKbmHwPQX3/wDupsG//n
AvswjQEqfv03MvTPNpEr50EBpeRbeA==
=jLYL
-END PGP SIGNATURE-



[SECURITY] [DSA 4374-1] qtbase-opensource-src security update

2019-01-28 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4374-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 28, 2019  https://www.debian.org/security/faq
- -

Package: qtbase-opensource-src
CVE ID : CVE-2018-15518 CVE-2018-19870 CVE-2018-19873
Debian Bug : 907139

Several issues were discovered in qtbase-opensource-src, a
cross-platform C++ application framework, which could lead to
denial-of-service via application crash. Additionally, this update
fixes a problem affecting vlc, where it would start without a GUI.

For the stable distribution (stretch), these problems have been fixed in
version 5.7.1+dfsg-3+deb9u1.

We recommend that you upgrade your qtbase-opensource-src packages.

For the detailed security status of qtbase-opensource-src please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qtbase-opensource-src

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlxOvoMACgkQEL6Jg/PV
nWQ5Vgf/RlQ9Wmx4fYN1+e2kNRcDz2EkA59YaYux+OTDvHGlS+pkQrlTWgJJZt/m
AzIjXb3VLWj9VqmwMA0vhxRFRh+tc2mubA7He8SDwaKOl0Is2GpU3qEGH7Sx0XHj
IxMqlxqDDXUQBTBWIFTA/Bi3uzD0sr7601PyPfUS0HI0c64Jw+HbtilwHtOqlDvW
Kjeyd+Oem1T1JitdXbgRVpubeN8uN+UEcKPFCXSBz8JiKfbEIn2Cd2VlpiMQSM7B
serZ1FYp2orHb22u9w/LSEsYMuFwnq2prBMoXHq7Znxr/pcqxTBzkrQ2VN5qQ0Tb
fT9PLrG3DsE37/OyUnMneGKMCY5tsQ==
=AW74
-END PGP SIGNATURE-



[SECURITY] [DSA 4325-1] mosquitto security update

2018-10-25 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4325-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 25, 2018  https://www.debian.org/security/faq
- -

Package: mosquitto
CVE ID : CVE-2017-7651 CVE-2017-7652 CVE-2017-7653 CVE-2017-7654
Debian Bug : 911265 911266 

It was discovered that mosquitto, an MQTT broker, was vulnerable to
remote denial-of-service attacks that could be mounted using various
vectors.

For the stable distribution (stretch), these problems have been fixed in
version 1.4.10-3+deb9u2.

We recommend that you upgrade your mosquitto packages.

For the detailed security status of mosquitto please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mosquitto

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlvRbKYACgkQEL6Jg/PV
nWTXRgf+LVq6UqDlXYtQT9xVTNj+LwSpPZBSOAGAd8lhvPX2Z+GfS7mCnp8b9hnc
KtT7SZ4BYaEhgrp7Jomo/XEBEkBKwpD9gOdHAtlzU6A6bwI3OSs5AY66ZqV32eJg
723D77W4hxzaqt0VBenARZTiei/O0u9sbjQxRylBCm/5J/tdMdzgSUoVpaO33WCw
nrK2rG9TQtvMtRxpy3fk2MDiAb1xZVKmzoVg5BPJ+D/9px+9cqy0TciYY+kGhHh+
gV9HFsdWIAqw/HT+bq8k3XbQEesLHCcv1uzTXAyvPIZ6yYQvIesMVWqSDVqb25+H
5NroxHUQ2P8T6SLpOnVmX+phDs9nVw==
=V3ia
-END PGP SIGNATURE-



[SECURITY] [DSA 4280-1] openssh security update

2018-08-22 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4280-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 22, 2018   https://www.debian.org/security/faq
- -

Package: openssh
CVE ID : CVE-2018-15473
Debian Bug : 906236

Dariusz Tytko, Michal Sajdak and Qualys Security discovered that
OpenSSH, an implementation of the SSH protocol suite, was prone to a
user enumeration vulnerability. This would allow a remote attacker to
check whether a specific user account existed on the target server.

For the stable distribution (stretch), this problem has been fixed in
version 1:7.4p1-10+deb9u4.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlt9ATUACgkQEL6Jg/PV
nWSHYggArjTv1/72Mxj8D8qXRiixHTY3QIRki03VOLQtk7tje8BmymeRerwmECGh
fjBuF4sueVrBED7vWpf9+HU9Z8VYLDKQp56xMLlqnt1Ge5HaPVHLToY4gn/lOl+J
pFGwn4BKYMlo+v/rnWg1Ay0n8DZnmg8GnBqgpeFI56AUy4rw9eaRAByI80Btd69u
vInT9A/sOYmywD4fH6cl7JDDZHF1AxgkW9Jar/tTVQtR/PqT7Cb2RJmxOB75/BrG
/8etuiWfh6sY4cBZco+AkXL2Yb97bJQdwDZQwqMLJtA2rdjSGA3zQdnzM8htrSYH
p0SeM24q209KRsvXG9KM3vKWW4vohw==
=qxOC
-END PGP SIGNATURE-



[SECURITY] [DSA 4228-1] spip security update

2018-06-14 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4228-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
June 14, 2018 https://www.debian.org/security/faq
- -

Package: spip
CVE ID : CVE-2017-15736
Debian Bug : 879954

Several vulnerabilities were found in SPIP, a website engine for
publishing, resulting in cross-site scripting and PHP injection.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.0.17-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 3.1.4-4~deb9u1.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlsiCn4ACgkQEL6Jg/PV
nWQXoggApFwGkzK369kROgPl0gd6QMvtTdIZdxqS+0B7ax44BRE9jFUHI/ENMycq
oWbq4jy8/8VuqsCX6PA/mKdlBtYktvj9SBH2zcEHhyyFZmZbPjtpRiY8Sd5iUrC0
k4IPTWkLLynZbUCcKs/bmMCOwPQorMfsFIFF18dVC4eiDMVlvaodKDXcvhfK/cS3
ycZH9Q+LNagKfNz8kgxoLQnL2RJJrd03WqGuU1l88xQ8nWjpg8DgMV3ZbzWLWib9
Ff6/J+AW8rKouNiBp9uuq16NhclK32tNjSIXrEmvae++Atiaj7vFHYahOhRfV7kN
oC0BIlxWX5gE+20/z6v5US/aCrx9hg==
=P0ev
-END PGP SIGNATURE-



[SECURITY] [DSA 4219-1] jruby security update

2018-06-08 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4219-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
June 08, 2018 https://www.debian.org/security/faq
- -

Package: jruby
CVE ID : CVE-2018-173 CVE-2018-174 CVE-2018-175 
CVE-2018-176 
 CVE-2018-177 CVE-2018-178 CVE-2018-179
Debian Bug : 895778

Several vulnerabilities were discovered in jruby, a Java
implementation of the Ruby programming language. They would allow an
attacker to use specially crafted gem files to mount cross-site
scripting attacks, cause denial of service through an infinite loop,
write arbitrary files, or run malicious code.

For the stable distribution (stretch), these problems have been fixed in
version 1.7.26-1+deb9u1.

We recommend that you upgrade your jruby packages.

In addition, this message serves as an announcement that security
support for jruby in the Debian 8 oldstable release (jessie) is now
discontinued.

Users of jruby in Debian 8 that want security updates are strongly
encouraged to upgrade now to the current Debian 9 stable release
(stretch).

For the detailed security status of jruby please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/jruby

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlsaS+EACgkQEL6Jg/PV
nWS8Jgf+LHR9BYS8ZelTjDsbTy87E4DKALqLWORN+12IhLMOAYqM02RJsH6tgOvj
nASVwqjKvOymnPAf+80dBU9VHY7vkNFryglhubUagHg+OqWHCg2Ovpm0JgR91nT2
TnFIGOvDpHmPqrTQ+yiDqsEC5E4ABveVbJ7uARQKZ3o4x5Gf8h+AnFZbNyZF9L4J
d53EzgUKBU+8SEqla1jchqErxg1yBvzCpDHI3SsdX+P+Ofa2tH8slSt4Qy8KHqcS
c9YGevgJLfl8ClqlST0hxYgNZhAxCJOocTUUnpBq1KKKx/PM1sW4w5+ynBHTuQoO
dnK5UGVKVgRu6nVgY5pZ0mcUtIhC+g==
=N+5Z
-END PGP SIGNATURE-



[SECURITY] [DSA 4204-1] imagemagick security update

2018-05-18 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4204-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 18, 2018  https://www.debian.org/security/faq
- -

Package: imagemagick
CVE ID : CVE-2017-10995 CVE-2017-11533 CVE-2017-11535 CVE-2017-11639 
 CVE-2017-13143 CVE-2017-17504 CVE-2017-17879 CVE-2018-5248
Debian Bug : 867748 869827 869834 870012 870065 885125 885340 886588

This update fixes several vulnerabilities in imagemagick, a graphical
software suite. Various memory handling problems or issues about
incomplete input sanitizing would result in denial of service or
memory disclosure.

For the oldstable distribution (jessie), these problems have been fixed
in version 8:6.8.9.9-5+deb8u12.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlr/BU8ACgkQEL6Jg/PV
nWTEIQf/YirH/RXDrvF4CRNZS3jPHCaNEmxXvvgs1tGTs04fQMPNdrEP2gZFfUnk
hu83t7GjUE+J1DAjjgtZQ9PQYPGhXidOaKHR6kTcUTENySl5V8PLkdF1EFK1M2Tn
CAd1TH4L5Q/2SFZnfBsu3KzpYOHWHSYl5BlJwwDznruGt7yAhHIGHP/RLRnlxJCx
uYUhM3PyU41CATeLCMX/owea3ND7Ro+ZpEKHy7KDcdx0WLx29yBU1wNN2+kxGsEc
ScHWGMFUMmTVeKtpfGF1rw5+8r6wgKiQoEzBPgSiXYLIDptTBTiS1rrBoy6hysXv
hi8jcwjII6qmrEqwTGjN1yMAnx/CWQ==
=UKUX
-END PGP SIGNATURE-



[SECURITY] [DSA 4174-1] corosync security update

2018-04-17 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4174-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
April 17, 2018https://www.debian.org/security/faq
- -

Package: corosync
CVE ID : CVE-2018-1084
Debian Bug : 895653

The Citrix Security Response Team discovered that corosync, a cluster
engine implementation, allowed an unauthenticated user to cause a
denial-of-service by application crash.

For the stable distribution (stretch), this problem has been fixed in
version 2.4.2-3+deb9u1.

We recommend that you upgrade your corosync packages.

For the detailed security status of corosync please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/corosync

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlrVih0ACgkQEL6Jg/PV
nWQ4tggAuZPJnVIcR+A+HMsW+LDldXgb14Y3OZ04RBE3493w0CTR1SWCLHs8xUUp
tf7NsPc3pxCJR1HVXkrmMHEMd7pfzNcg6T/xE07wxoEG1cv1udILoWpBrPOAEL+p
qKYDC07WBmyWF5/PbjU18os7y9QE2/6m4ZSlqEanAbqN3VRj3Jemp0yEzYO1NU2W
tx5d97O6WOjdg8BfFxYFtBuqvmysXDB2y+8e6XmkDxV5dbI64b1Ssd2ejCdRLju1
ymQ4k1NvBlX6Cx1XETTdtTRSPOABBd26Cb9ZpmWwRghgR0vW6EqKFNWSs44CDUxm
mH6BJWCCtptomJ8ZbGUobjxbSd1LXw==
=vEL+
-END PGP SIGNATURE-



[SECURITY] [DSA 4147-1] polarssl security update

2018-03-21 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4147-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 21, 2018https://www.debian.org/security/faq
- -

Package: polarssl
CVE ID : CVE-2017-18187 CVE-2018-0487 CVE-2018-0488
Debian Bug : 890287 890288

Several vulnerabilities were discovered in PolarSSL, a lightweight
crypto and SSL/TLS library, that allowed a remote attacker to either
cause a denial-of-service by application crash, or execute arbitrary
code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.3.9-2.1+deb8u3.

We recommend that you upgrade your polarssl packages.

For the detailed security status of polarssl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/polarssl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlqyZtoACgkQEL6Jg/PV
nWQNXgf/dWbA84eKSfhDbsIGEHvazbvA1XakD0iG5aCYUJL/f2skDSxrCMQucXRU
9pBepOHTlaZ/yeQOvW4Jw+aThWtG0Y8VJU23+z5C66ClSXSdtsZ4lvFMbv610KVo
zBbTQ8u92fyENb3Sl6IinT8WVkqJ5ed1060Qbj0jwKTQ35NDFDmDKxbT8j1Nx0za
f974AeHE1kSApSHjkpr3gwbiAvzQn19pDuk5rN7dGns6tPvov6JmOrQRHr/JknEl
aDGIM/VfXggPTZoh1pPlv3FOCf4po3+cpXuKR1YbwrLkcslQdOMdT2EQCNLq9RD3
SGBi7CnlM1Bw33K0NTo1OJRcIuCXQg==
=ndmj
-END PGP SIGNATURE-



[SECURITY] [DSA 4138-1] mbedtls security update

2018-03-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4138-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 15, 2018https://www.debian.org/security/faq
- -

Package: mbedtls
CVE ID : CVE-2017-18187 CVE-2018-0487 CVE-2018-0488
Debian Bug : 890287 890288

Several vulnerabilities were discovered in mbed TLS, a lightweight
crypto and SSL/TLS library, that allowed a remote attacker to either
cause a denial-of-service by application crash, or execute arbitrary
code.

For the stable distribution (stretch), these problems have been fixed in
version 2.4.2-1+deb9u2.

We recommend that you upgrade your mbedtls packages.

For the detailed security status of mbedtls please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mbedtls

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlqqS+sACgkQEL6Jg/PV
nWTGzAf/Qxdeu9zdq0KMbcx7yKbr1zpchng/Y7doZFZviKjK2eZb1KvXCR3LqHzx
L4+fZE/aK1cfQXdG424xYZkKGrpcz7WFyZV7euDv0vFpk4QmdDQHHVS+jPqvbRT2
x0ekhE98uKzJirOTdES2P2yrF+eNYtRowxbqw0q2uqchGmwYnRKYaApSbSaaaybN
4Ltoj3bTIv0dyEDN95JTzRY405iwVaeQiP5+RjlTnAo2wVQmw1GVV1Dm+fIOMo+i
hc41fuKdHrGTod4Gh1opg3cF7AKGoL2cRBrbBVMZp6mk+cdjwXoWrmDzxol7sHXO
Rp4o8Ci2n36DYFtugUaBnDVumcLk0w==
=tk/E
-END PGP SIGNATURE-



[SECURITY] [DSA 4128-1] trafficserver security update

2018-03-02 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4128-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
March 02, 2018https://www.debian.org/security/faq
- -

Package: trafficserver
CVE ID : CVE-2017-5660 CVE-2017-7671

Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server. They could lead to the use of an
incorrect upstream proxy, or allow a remote attacker to cause a
denial-of-service by application crash.

For the stable distribution (stretch), these problems have been fixed in
version 7.0.0-6+deb9u1.

We recommend that you upgrade your trafficserver packages.

For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlqZem4ACgkQEL6Jg/PV
nWRrngf+N5S4zOMBaPdHfJN27x0ZTcEiNxvCh1yc2xQyu3suc+dSsFQ2adeEUIlC
Jbd6zi11P9MoVDSrk4ywLX9AQz+E60UKMhnarUYWzhPvC76aFbXV2x3968TPXNoD
wA5gXvE0w29OyNnSEAN8haEwMNv6BQcrSLE9SO4GI9cdfwM06rpYhVTKi78t+CZH
wYiOuYgBNChNE5WoyJ4fypbxRLUzRNNNW0u/URX4rcxBvzAQ/Dikn5wX5z1Tl2t6
tfUo7Z6QYex3VwzPXbFcWWm6QQACoRPRmh16UK4/lWwvo0faa9f2usX3u+bIowWF
rArW6BygAPlXiIuAnhE7aBlazRMiDQ==
=Bawx
-END PGP SIGNATURE-



[SECURITY] [DSA 4092-1] awstats security update

2018-01-19 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4092-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 19, 2018  https://www.debian.org/security/faq
- -

Package: awstats
CVE ID : CVE-2017-1000501
Debian Bug : 885835

The cPanel Security Team discovered that awstats, a log file analyzer,
was vulnerable to path traversal attacks. A remote unauthenticated
attacker could leverage that to perform arbitrary code execution.

For the oldstable distribution (jessie), this problem has been fixed
in version 7.2+dfsg-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 7.6+dfsg-1+deb9u1.

We recommend that you upgrade your awstats packages.

For the detailed security status of awstats please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/awstats

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlphtDgACgkQEL6Jg/PV
nWRmuwgAmVAKcZjARRVoHOatp4foI9QPyCtTwZAfw+46H1SoA92y72LL3lCvHfre
OHoOaJdVWY937guS812xSWbfWkw+u+RCLq9WyHlrJQor1IgPnF54kNbMHnyYb5RF
+63i3ZrBfqfUqBLkYhsVdDIcLRe/f973mv3MJvI8WuZyJ7c5aGx1KeL2HiWbLTeQ
rf5+E6vWbAGSR13+E/5AEM1CQ69CzsTcXJo6txeQwOnVNMb3S5ln6iKHczpTcO5C
FSNs7pawHGaZubFAQcf+nFjcGnA9Ix+kxWAunPtp3vXagADWfS1cnXi0QUkEG3nv
d5AlDg8JvdsnTX/KudXC3nqAfEhRsw==
=7vDn
-END PGP SIGNATURE-



[SECURITY] [DSA 4084-1] gifsicle security update

2018-01-12 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4084-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 12, 2018  https://www.debian.org/security/faq
- -

Package: gifsicle
CVE ID : CVE-2017-1000421

It was discovered that gifsicle, a tool for manipulating GIF image
files, contained a flaw that could lead to arbitrary code execution.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.86-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.88-3+deb9u1.

We recommend that you upgrade your gifsicle packages.

For the detailed security status of gifsicle please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gifsicle

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlpYpIwACgkQEL6Jg/PV
nWRjYAgAo0Drf8Jo7xHbRjuStl9ixkAC/UBNOngLvs38BdE5hDPRMIngwjnKEIGl
ms11ascazOu4vKRbsZwQxt0mDI6J4XMnMBSLV4JfsFlqdNTFwdyLSAULHEJ6/N3T
zBRMfW8nD/kYWLbyFkTG3BXXWmgCXXSuwoXg2+G4rUox2XK4PNAJ0uloveQS46pm
GwYgqS4f9HFBAbXZnUDfQHdUsRZ/Q2spzvvBT69n88jEEYAcGi7YDW+smDXGgnuU
Vsu3N+dPrCLLPAsUPsyFbLEXxbg9el4chLe2Ged/ZUUYt/ZGZlM5t4MR9HqtORNB
gB1ApmNxoTyC0Y5BrqmSU+mmXvVfDQ==
=jqum
-END PGP SIGNATURE-



[SECURITY] [DSA 4083-1] poco security update

2018-01-11 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4083-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
January 11, 2018  https://www.debian.org/security/faq
- -

Package: poco
CVE ID : CVE-2017-1000472

Stephan Zeisberg discovered that poco, a collection of open source C++
class libraries, did not correctly validate file paths in ZIP
archives. An attacker could leverage this flaw to create or overwrite
arbitrary files.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.3.6p1-5+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.6+dfsg1-5+deb9u1.

We recommend that you upgrade your poco packages.

For the detailed security status of poco please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/poco

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlpXJZkACgkQEL6Jg/PV
nWQSAAgAyZdKxW5ach7bfDAW9JiPHMAMW5Z32DFgmcEqfmYhFbTa9I3nF6yABjiJ
QTF2eSwmPDua6QzozOI4OGAFfO0aJ4DH70pEuj1B0Ea5CItiMeZXXFiquL6sdjud
OJTt1Iwh5eKRW0iOenQw24QU4Zd6r254MpIYtppdHfVYF45/E08KcTh78yTEpB5a
XR4L23oVQOonytc0GASV/mogfce5bPRMvaGMONQo3d66Dfe5grFFUfO9yrhT47G1
r3eIsMvPWHp6tiCToiZ4nc2/z+o8rp/oBP+y9imvHrZXpsdEjl9DOM0miBrqmzZ6
NOSk3Dywnxm+JPwxJNNf/fm7zbYALw==
=cZI8
-END PGP SIGNATURE-



[SECURITY] [DSA 4056-1] nova security update

2017-12-07 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4056-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 07, 2017 https://www.debian.org/security/faq
- -

Package: nova
CVE ID : CVE-2017-16239
Debian Bug : 882009

George Shuklin from servers.com discovered that Nova, a cloud
computing fabric controller, did not correctly enforce its image- or
hosts-filters. This allowed an authenticated user to bypass those
filters by simply rebuilding an instance.

For the stable distribution (stretch), this problem has been fixed in
version 2:14.0.0-4+deb9u1.

We recommend that you upgrade your nova packages.

For the detailed security status of nova please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nova

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlopB00ACgkQEL6Jg/PV
nWQvGwgAh+clzIDc7FdEhuYFSmGPz8XOxnIsvyymeYxvz/M3gCkQU2tdw/80Jv78
Y35pP1g8u/rq1Ub4cV6QAZt1UK571m8qXFqh/mnxOwFuqQJrkY0L8pu93anRVAz3
uwPlwC3jKo4dEyi4QDphGc54qiqf28twWz8iX+XdnBVG++T7ZAZykbqU5+WlNpQF
5kpbFsUV38W6jP2VyQ/2/Uozh839rnhBmQ/Sy9gIbIeycbp0Veigwh5PVnXgXqvA
83O8oTr2++5prB24ESFcl8FQ82kjs2suf4M1IbLJyJrsT6X1VORcYz6PPW/v3EVq
whmgpC6orU68AoPGo4FDHV8UpH7HoA==
=+GR1
-END PGP SIGNATURE-



[SECURITY] [DSA 4055-1] heimdal security update

2017-12-07 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4055-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 07, 2017 https://www.debian.org/security/faq
- -

Package: heimdal
CVE ID : CVE-2017-17439
Debian Bug : 878144

Michael Eder and Thomas Kittel discovered that Heimdal, an
implementation of Kerberos 5 that aims to be compatible with MIT
Kerberos, did not correctly handle ASN.1 data. This would allow an
unauthenticated remote attacker to cause a denial of service (crash of
the KDC daemon) by sending maliciously crafted packets.

For the stable distribution (stretch), this problem has been fixed in
version 7.1.0+dfsg-13+deb9u2.

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/heimdal

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloo8VsACgkQEL6Jg/PV
nWQsrQgAkOt019q15yl6Ctx1SzWHNT0NfOFybG8WzMp1TZ3JzjsoRUSffymWKceB
mJiuim5J+5se2+bVEMkblsXuNmbqnn1EaTwZ6XjI41J5Kv+/2qvbGsosvGP8JdTB
0cHWgSyNTaV8mwD745AoctIN8BL/5lxO3r7LjC8Mpw+W7l3XjhK6SfGL2QHd65BY
6K2r1hHTypOM3iLSNnWC2nR9/4OK5RU2JBvK9kjP4cRJJzZX7JacR53tO/+bY4eL
5fEzXexh97jNW7M5svJtCsdyoEwauAtkIl6noLGTs+K/a8afw8VU0gDQfTD35d3H
e+rG1WMEv0H1tYQGdIKOGqtWYuNQKQ==
=iHQJ
-END PGP SIGNATURE-



[SECURITY] [DSA 4046-1] libspring-ldap-java security update

2017-11-22 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4046-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 22, 2017 https://www.debian.org/security/faq
- -

Package: libspring-ldap-java
CVE ID : CVE-2017-8028

Tobias Schneider discovered that libspring-ldap-java, a Java library
for Spring-based applications using the Lightweight Directory Access
Protocol, would under some circumstances allow authentication with a
correct username but an arbitrary password.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.3.1.RELEASE-5+deb8u1.

We recommend that you upgrade your libspring-ldap-java packages.

For the detailed security status of libspring-ldap-java please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libspring-ldap-java

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloVtEUACgkQEL6Jg/PV
nWSbSgf/aBFHoKWTrjUx9W++O+Fc7Or0ZqMYZgHRTmWxorIRL+QT18jxVYYwnKfe
JLvjuX68foYcS9oArbcNbafYWgjkRVZZCA05+RT8ws0c4qC4/0Gf909jn/7iUCp1
4bLdLNYrTm5rkk2a1iNOu7GDAo5bTanj/0uZVKp78U9mn3bJkzjy+TUSAe9Aw/fa
pBAGlIJfp7PSTB1BHjaW2cHActuTOKQyT9rN33GFK3lX40TqMesyOL7mZiJtBJ/C
+YtlrdHHL8uuQA9Fg6LMEzwMBOtmtgvaN6yVpn80BZSQ6nsL+r+xQRutGPup1Gq0
xaYT8ClXlaYknaKtTbZ6dJMdmvz4Bg==
=4Vlo
-END PGP SIGNATURE-



[SECURITY] [DSA 4037-1] jackson-databind security update

2017-11-16 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4037-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 16, 2017 https://www.debian.org/security/faq
- -

Package: jackson-databind
CVE ID : CVE-2017-15095

It was discovered that jackson-databind, a Java library used to parse
JSON and other data formats, improperly validated user input prior to
deserializing: following DSA-4004-1 for CVE-2017-7525, an additional
set of classes was identified as unsafe for deserialization.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.4.2-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 2.8.6-1+deb9u2.

We recommend that you upgrade your jackson-databind packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloNf+oACgkQEL6Jg/PV
nWTBnggAogzxlYvQ7LVYtUo8TLj2LLOUdeXAzDvUK8fCAXVxfwGUBayM81jy2DPL
IRx+GLdnnturazObeVtwdw+7ipLkMwviQkUdfqjwlL71XoKLTnAdaL+pmcfdQTZm
Zi+IouYhKkoGdrHNx6CLW7/xQJc3WU6vHC2Mnl6YrVvvkgkQwZHrJuHwfdW0ZBD1
/0gZlc72Uh5pSQAQNIbHMdvbKjyhctH7ZFIN/G+AehPD1lIW9nPgM0B0Tr3QavzF
vy1plEmWgeTXCHwhZFPZcNuAdcO4bhZEfm8r/ZixXcKBqdaknMiXpvO6IsPhwhTv
WfSQKHm2EnMgu5qxudy+QvJW/KUi7A==
=3gTd
-END PGP SIGNATURE-



[SECURITY] [DSA 4026-1] bchunk security update

2017-11-09 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4026-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 09, 2017 https://www.debian.org/security/faq
- -

Package: bchunk
CVE ID : CVE-2017-15953 CVE-2017-15954 CVE-2017-15955
Debian Bug : 880116

Wen Bin discovered that bchunk, an application that converts a CD
image in bin/cue format into a set of iso and cdr/wav tracks files,
did not properly check its input. This would allow malicious users to
crash the application or potentially execute arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.2.0-12+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1.2.0-12+deb9u1.

We recommend that you upgrade your bchunk packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloEk+wACgkQEL6Jg/PV
nWQThAf+O/cqMInKkiwqZ72TdQiADpZgta7ZKCA8gmLMIUwgirZhZxoJAY2AIebR
M/QPVlBzyo/W5jxbzZD/YO4ZlbKF/X5opiBW+2oXxnPH92zDSDSYrZ1tCzLBwLZT
GzsVdUx+p8AQX0W1NBaX49RG6jyrMA+LwsdwCLAlyvdQsCYASrG0QheFpOHtE6Fh
Oe6MbaG3iepNWZl0qEdTQfPO8yEYP6hQ9eUo2dUAnEUyhLvuRPNCtPutS/EhB715
awMvJ4hKQ9g5WaEeZPf5DlLbdpcBY+oVQPe8wrSh+qHnuMGMrtTUwlD/xxrt5uoJ
gWxJK6iTJqHS731J1oECJxiQum/MBw==
=pVF7
-END PGP SIGNATURE-



[SECURITY] [DSA 4010-1] git-annex security update

2017-10-30 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4010-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 30, 2017  https://www.debian.org/security/faq
- -

Package: git-annex
CVE ID : CVE-2017-12976
Debian Bug : 873088

It was discovered that git-annex, a tool to manage files with git
without checking their contents in, did not correctly handle
maliciously constructed ssh:// URLs. This allowed an attacker to run
an arbitrary shell command.

For the oldstable distribution (jessie), this problem has been fixed
in version 5.20141125+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 6.20170101-1+deb9u1.

We recommend that you upgrade your git-annex packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAln21ToACgkQEL6Jg/PV
nWRtQAf9Ei+h60JxNnNzcD+Ymrw79U0YMEGLmvuBwDLVoChsHj9XYhMvW/AWCNhf
G6zMjmhwNH33vY8XPfaOnTdZiKKY7sIdOqCFT0besXrxIutJqj9qv61A33s9XSXs
KAvtCkI6IywY+Gwo7BYaohA2gIIvopLfW9ssc/ZwGMnNE5ahFX6jPFhZz4oL9Luj
9Y6HzJobJihAlVtaPki5wNwZcz2WshIp3yV6+0nsUpxDpomVimEWbcCkf2LdmP4p
PsftHwRjMLNHZk4M1ZCF4EYi4rQh/P1ECxl45puuiOqI2kBIzxO/QJviTK2y3Rj0
+NLx8qR+fb/sKKLbgfKvQs0QSRkIpw==
=VejX
-END PGP SIGNATURE-



[SECURITY] [DSA 4004-1] jackson-databind security update

2017-10-19 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4004-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 20, 2017  https://www.debian.org/security/faq
- -

Package: jackson-databind
CVE ID : CVE-2017-7525
Debian Bug : 870848

Liao Xinxi discovered that jackson-databind, a Java library used to
parse JSON and other data formats, did not properly validate user
input before attemtping deserialization. This allowed an attacker to
perform code execution by providing maliciously crafted input.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.4.2-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2.8.6-1+deb9u1.

We recommend that you upgrade your jackson-databind packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlnpjfIACgkQEL6Jg/PV
nWRpNgf/Qr9B9O5J6JfcQIZV2j0gFEtskjYjzw0Mus+TC1IMFHOLRcKMD4O0FgGO
IY8IPrBoefyvYxwwZNVCY86yo21uiMNAqmAnJBBpt0t7GCViDyKDJNK+ksNH6Ey9
bjEF+Pck4Ku5bHXUEb0/W1u91I6dKye1wP4R3S8sUaGxlEDeVPJTfGtXTpe+oB+Y
CO7J3XtzpaF4d83SFLmOCobWBe0zKWHvTu5PiJdSwJvhEPmFNkTrs2v8yhxmS8Gv
K0kF8P8EdXS2pB5sxKV17nw0IIs+D3nVey1BitNkhhQ862ChlkgYMspjukcBuwHd
W2/rMyC2JxiXyeT4w8CxNok2BHjKRg==
=RuHf
-END PGP SIGNATURE-



[SECURITY] [DSA 3974-1] tomcat8 security update

2017-09-15 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3974-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
September 15, 2017https://www.debian.org/security/faq
- -

Package: tomcat8
CVE ID : CVE-2017-7674 CVE-2017-7675
Debian Bug : 802312

Two issues were discovered in the Tomcat servlet and JSP engine.

CVE-2017-7674

Rick Riemer discovered that the Cross-Origin Resource Sharing
filter did not add a Vary header indicating possible different
responses, which could lead to cache poisoning.

CVE-2017-7675 (stretch only)

Markus Dörschmidt found that the HTTP/2 implementation bypassed
some security checks, thus allowing an attacker to conduct
directory traversal attacks by using specially crafted URLs.

For the oldstable distribution (jessie), these problems have been fixed
in version 8.0.14-1+deb8u11.

For the stable distribution (stretch), these problems have been fixed in
version 8.5.14-1+deb9u2.

We recommend that you upgrade your tomcat8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlm7v8kACgkQEL6Jg/PV
nWTiaQf/VyP0zFZLkavB79tt1VOOL4SySHg2EiHt1mIcoWg40varb/yFffS5Hoax
pltX7er3jF1mJBaXrM2D4Sz2xTIRrDolf1SK6rnUn8z3Jg7jhD5SZy/y8aEY6+H8
Wfj5CZ2Y3S1WYSXsVqH08/hUCmCke5vxUc4s8FTaDVSfVfX/xoFrD3Juo1MNOo67
oP9RbjL24CNSosJn51eMDbYEHq0rpBa+NrkwSlkmd1kG6H4jnTna2b4YYeJsEULy
UFBpoaSxY1pmsflfNifE5aU7Np6G2cundReDnnij+RUM6YBEdCO8uCw/YqRKgNnb
DGUwNCoS7/DQ2a9IkKt+8yEFPOMpBw==
=xr3r
-END PGP SIGNATURE-



[SECURITY] [DSA 3963-1] mercurial security update

2017-09-04 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3963-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
September 04, 2017https://www.debian.org/security/faq
- -

Package: mercurial
CVE ID : CVE-2017-9462 CVE-2017-1000115 CVE-2017-1000116
Debian Bug : 861243 871709 871710

Several issues were discovered in Mercurial, a distributed revision
control system.

CVE-2017-9462 (fixed in stretch only)

  Jonathan Claudius of Mozilla discovered that repositories served
  over stdio could be tricked into granting authorized users access to
  the Python debugger.

CVE-2017-1000115

  Mercurial's symlink auditing was incomplete, and could be abused to
  write files outside the repository.

CVE-2017-1000116

  Joern Schneeweisz discovered that Mercurial did not correctly handle
  maliciously constructed ssh:// URLs. This allowed an attacker to run
  an arbitrary shell command.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.1.2-2+deb8u4.

For the stable distribution (stretch), these problems have been fixed in
version 4.0-1+deb9u1.

We recommend that you upgrade your mercurial packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlms+vwACgkQEL6Jg/PV
nWQD6Af/Qd87aCWVfqfpCjeHpW+l6JWU/90pbf6pAFNt56WJzKm0A6HZi0ep1Pvg
QBIB7V97Nu35gCYgzvAL4Mj35vV1WdVPNBfPzcLByC3b0U615GkM58egNCwz6bt2
PFYOn7GE1T0eph0vNxAh5cktyJMnNfD2su61kinxYvtOZPnBVKGeqmvB51gGMlmA
eGcmPUxNsrjBxTaBW7L2vMjHb4zp+dQQYn3So4bRQS0vSIIl77+D2hZO+Pme4XZO
LW4B6kTiwMCRbLDfy2I8+qyZdaIrs9rrfyMYeBC2+lYlL+u05qUrj/9+Igf8KBOa
jPketS2AOfb3hS4o123Kfv4Rwuqesg==
=i/YV
-END PGP SIGNATURE-



[SECURITY] [DSA 3958-1] fontforge security update

2017-08-29 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3958-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 29, 2017   https://www.debian.org/security/faq
- -

Package: fontforge
CVE ID : CVE-2017-11568 CVE-2017-11569 CVE-2017-11571 CVE-2017-11572 
 CVE-2017-11574 CVE-2017-11575 CVE-2017-11576 CVE-2017-11577
Debian Bug : 869614

It was discovered that FontForge, a font editor, did not correctly
validate its input. An attacker could use this flaw by tricking a user
into opening a maliciously crafted OpenType font file, thus causing a
denial-of-service via application crash, or execution of arbitrary
code.

For the oldstable distribution (jessie), these problems have been fixed
in version 20120731.b-5+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:20161005~dfsg-4+deb9u1.

We recommend that you upgrade your fontforge packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmlIokACgkQEL6Jg/PV
nWT9QAf9GKd21mv9ExDFSOID2I+cIinOrZRSkOvnZSHVLhaJIg4yhhWOCfquktoU
CgVRMuH02qeR/4PNJCvqC7mq0tvWg6TVJqtQGVQhqQmLqwA7m1bz0qzi4uBfEsML
rFmmttIPNqi9J6gydeqJHG1Pl0eJWxsIpzKr6ZNeb+SxurE3mkhCsUW8mqkl8brb
LtD7kxD573pS1L7Ny9mYm8ZutIN05dm/VqntleOxE1QeHDMBZVTChowT6RK7bq/q
GWAgGoWZwF3JJCf8TW1ybXM/BHuSEh/v5k6srGt/kO7gM4tDdeNVlz1GXuT3GTI5
YI9BM6MO2NKq1eG4lt43GCq6gcjFVg==
=AQ9b
-END PGP SIGNATURE-



[SECURITY] [DSA 3949-1] augeas security update

2017-08-21 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3949-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 21, 2017   https://www.debian.org/security/faq
- -

Package: augeas
CVE ID : CVE-2017-7555
Debian Bug : 872400

Han Han of Red Hat discovered that augeas, a configuration editing
tool, improperly handled some escaped strings. A remote attacker could
leverage this flaw by sending maliciously crafted strings, thus
causing an augeas-enabled application to crash or potentially execute
arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.2.0-0.2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1.8.0-1+deb9u1.

We recommend that you upgrade your augeas packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmaoi0ACgkQEL6Jg/PV
nWQa6AgAuDE/urqDtUlXt53PL3b9pZsUSdKQ+74l64hhKMV0+kQ8SSitBdcjXR/8
1nsdd7Qi36lOCwYv7EEcCqz98puB+ef31LwVZiYbVLAG6YT54Zl7XSSIpXx94Ef+
JCAJ8NGOCLoqHjTNtsQVnPMtLUbV42aDqlNeDgMEXzvoDb/k8R4CmrSMremz8xn9
0bPuziBV73NfQAf3hnrj+Q+whEHg9rCie/wsH1m6QcpibJEJpLlTC1gV8PZehGMM
g3h+H2XV/YrMR1swecIH5VxIEeLCL0mgeLJ4azfIxyWH0adVFRCRp8ZiZ3c2KyQS
ejEgj24vgFvrvdQWGAeeh0dl2e/LWw==
=502b
-END PGP SIGNATURE-



[SECURITY] [DSA 3946-1] libmspack security update

2017-08-18 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3946-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 18, 2017   https://www.debian.org/security/faq
- -

Package: libmspack
CVE ID : CVE-2017-6419 CVE-2017-11423
Debian Bug : 868956 871263

It was discovered that libsmpack, a library used to handle Microsoft
compression formats, did not properly validate its input. A remote
attacker could craft malicious CAB or CHM files and use this flaw to
cause a denial of service via application crash, or potentially
execute arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.5-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 0.5-1+deb9u1.

We recommend that you upgrade your libmspack packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmWriEACgkQEL6Jg/PV
nWSjpAgAoBv5fbJpOjLiluLV3ArGCiIg2W2XYrHUe309kFpomZ3OqFoW3d6OO7xS
9msEABEYEHfGdTSFWzAz9gPv3Q0B/hZcO+Hjv7SRYoNNO8DnBkLvOMyzmJ/Av/6n
aDIifUOU94EMFp9t0MbCJxOQBhWqZgye5w8JG7bHjn9YUN/qGX/6rdp7RoCyXF8+
UNptvNSOqEslrByLeoSbe4Wpv+jEdTZHjVzyT8nEv7tUbfXhMIFQWYWUiFuIwTiX
8HUAxWA2bGwiAryjw/qo2mjdbfcR0Mq0wyL4Yuh4OLjsug6rIxwzSMa7/XA+GGFy
jzcc4eNuKRE+ZddmbbXe1OKHHe1wkQ==
=hX4O
-END PGP SIGNATURE-



[SECURITY] [DSA 3940-1] cvs security update

2017-08-13 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3940-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 13, 2017   https://www.debian.org/security/faq
- -

Package: cvs
CVE ID : CVE-2017-12836
Debian Bug : 871810

It was discovered that CVS, a centralised version control system, did
not correctly handle maliciously constructed repository URLs, which
allowed an attacker to run an arbitrary shell command.

For the oldstable distribution (jessie), this problem has been fixed
in version 2:1.12.13+real-15+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2:1.12.13+real-22+deb9u1.

We recommend that you upgrade your cvs packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmQFhwACgkQEL6Jg/PV
nWST2Af+PpoK8xsgAPPNowUS7+Vg4y/ogmf/s5aRTbWw0w1y2aAC0kz1VohUhP+q
lNypM1gNqUCnRL5r/e7EfsTkj5Xwk355wizHg2VgElpv+HAFSMu3y78O3tA3R9Hb
VCT0YCzsOOt9UlnMgZMMNJf2yeXYFgTj94j4W2yf2Q4h3v3wvWCwH4vEAjC0qoBC
RvnDvxJv0sJWKBmZExv2QCIojROlSjBYju0DYFzZnacrHH6HrjI77jy7IUSZxQnN
CWEI03Xla2QAeW541r0YGhKFoC9+aMbXQnn8miJv8s3jSggIZYw/QVADRRbHk5Q5
SDHYK3IynlpBqBVtuT4Ak6DrHLjDBQ==
=Rc7I
-END PGP SIGNATURE-



[SECURITY] [DSA 3934-1] git security update

2017-08-10 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3934-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 10, 2017   https://www.debian.org/security/faq
- -

Package: git
CVE ID : CVE-2017-1000117

Joern Schneeweisz discovered that git, a distributed revision control
system, did not correctly handle maliciously constructed ssh://
URLs. This allowed an attacker to run an arbitrary shell command, for
instance via git submodules.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:2.1.4-2.1+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1:2.11.0-3+deb9u1.

We recommend that you upgrade your git packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmMrNUACgkQEL6Jg/PV
nWRICwgAlwokEXk2KcCA2aT8lnNlKjM2Ur97JlCB0Ceyu3l+wFfeTeRAN3wRBZAg
UNbeElPoCkpLJGiqiSIz7E1EOn5GmMUGoCqy2HWrDvYAKaMvkvWUOHtBaq3nvrGg
HsLGc3g70zf2Egv06R94jBisktqn847OAs9FMKz6mrnxZsRCGQPIe57+GYHC3dH9
bTGnwEYiBI5gkQV4uIheVGxKBup9CB5CXQWx9suzG5YRNXLpp1PIBSOaqM4Tstam
Kk1yXM1qVlZ6tKwCMsIJJ7aBs5AEt1cYLQqxjr917zoACwiGOuAiAvJZs+Mlsb2Y
aAc1b/mWIMC3oB6hxl1Lsr6V2/4M4Q==
=VNzk
-END PGP SIGNATURE-



[SECURITY] [DSA 3932-1] subversion security update

2017-08-10 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3932-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 10, 2017   https://www.debian.org/security/faq
- -

Package: subversion
CVE ID : CVE-2016-8734 CVE-2017-9800

Several problems were discovered in Subversion, a centralised version
control system.

CVE-2016-8734 (jessie only)

Subversion's mod_dontdothat server module and Subversion clients
using http(s):// were vulnerable to a denial-of-service attack
caused by exponential XML entity expansion.

CVE-2017-9800

Joern Schneeweisz discovered that Subversion did not correctly
handle maliciously constructed svn+ssh:// URLs. This allowed an
attacker to run an arbitrary shell command, for instance via
svn:externals properties or when using 'svnsync sync'.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.8.10-6+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 1.9.5-1+deb9u1.

We recommend that you upgrade your subversion packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmMqV0ACgkQEL6Jg/PV
nWRK+ggAgTLGpBr6HhwRYwjZ0jIGVZ0+CF3Wq7ypkYdyW4C/SQSgoefQ9PLdrr8A
FShgukqNtRE626pc6vLBvNWTC1xtyB3Oez5qy/Hlpi4O5eV4NBLJSN1Yo8vsFlmi
t++uI9+v+pZ1I2LUYptmJH8Zf+MsT22VIpqMxbvFPvQUWp5+rCwKsl743KVsqAqo
acXR0o74D0jeCMtcAdAVSbO6zelac6fl+AM7729oxW5aoB6qXWDWphYouq2e1CTR
KfeBI02i61z2L6N0k1WzPfSvl0DGlN2PJ8WtAlW8iRIX0KL/FAM9VuE/92pVGZWr
7b7fYjiRiQKV5dxVjODbus39EX+avQ==
=MQa7
-END PGP SIGNATURE-



[SECURITY] [DSA 3930-1] freeradius security update

2017-08-10 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3930-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 10, 2017   https://www.debian.org/security/faq
- -

Package: freeradius
CVE ID : CVE-2017-10978 CVE-2017-10979 CVE-2017-10980 CVE-2017-10981 
 CVE-2017-10982 CVE-2017-10983 CVE-2017-10984 CVE-2017-10985 
 CVE-2017-10986 CVE-2017-10987
Debian Bug : 868765

Guido Vranken discovered that FreeRADIUS, an open source
implementation of RADIUS, the IETF protocol for AAA (Authorisation,
Authentication, and Accounting), did not properly handle memory when
processing packets. This would allow a remote attacker to cause a
denial-of-service by application crash, or potentially execute
arbitrary code.

All those issues are covered by this single DSA, but it's worth noting
that not all issues affect all releases:

  - CVE-2017-10978 and CVE-2017-10983 affect both jessie and stretch

  - CVE-2017-10979, CVE-2017-10980, CVE-2017-10981 and CVE-2017-10982
affect only jessie

  - CVE-2017-10984, CVE-2017-10985, CVE-2017-10986 and CVE-2017-10987
affect only stretch.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.2.5+dfsg-0.2+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 3.0.12+dfsg-5+deb9u1.

We recommend that you upgrade your freeradius packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmMcIgACgkQEL6Jg/PV
nWT0QQf/YXstsKWljtn5stb9LLdmDXBWoRBdstYpYEUyYVXcJMFMwQyyZJj7N2Yv
BNX3EYTv8+8QzHJSEmO7bXfLf+QHGBC4k8F2+EwSPxkc1fg8bIhcT/oCe95q7o7t
n64PmW0JTuCIaK7xosxvxSCnFaDKgJ8Eq3RQ8moRA0RKoAzK15c2pGtVN9cTeZkj
5eQXstBR4xCUWBWHHdYiZKhqMSUqYf09UTgCpPqhDka6RJrXfFZuaaHWrstUUiI2
kl/3zprVUwdGS49Em1PjusCxx07Rri8frKj4NsBcCmvdLJ79TXelaMQvgr66j7bm
DcjWUWKgB2iPOlodd++1zA25gaFVpg==
=9u8a
-END PGP SIGNATURE-



[SECURITY] [DSA 3923-1] freerdp security update

2017-08-01 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3923-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 01, 2017   https://www.debian.org/security/faq
- -

Package: freerdp
CVE ID : CVE-2017-2834 CVE-2017-2835 CVE-2017-2836 CVE-2017-2837 
 CVE-2017-2838 CVE-2017-2839
Debian Bug : 869880

Tyler Bohan of Talos discovered that FreeRDP, a free implementation of
the Remote Desktop Protocol (RDP), contained several vulnerabilities
that allowed a malicious remote server or a man-in-the-middle to
either cause a DoS by forcibly terminating the client, or execute
arbitrary code on the client side.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.1.0~git20140921.1.440916e+dfsg1-4+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1.1.0~git20140921.1.440916e+dfsg1-13+deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 1.1.0~git20140921.1.440916e+dfsg1-14.

We recommend that you upgrade your freerdp packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmAJrwACgkQEL6Jg/PV
nWRGTggAvrKAdr07xRi4Jv4qpvhWcUGS0FvDmIPfKxCKl7oX12nrJmkZysA27cck
Ql5AIj+H2VgrgnKS0Zc9FgXpXHo+UpOANqJCN8FlFNvH6v+EanzxOSy1cyScSEj0
t8d1nwtLXlHL3XLArk1DkfSDGkuHbLtMO01ENvzQG2SAemqo+nhGucHdFDHinD44
RLRCPKV0h08UilUqd8WAeYxP6NwiedP34+TngaMZ0iZ/ctVjIPLUqkoIok7oMZRm
mEkjtGtzFQj6TlPcSohSQoSRWHEcQeCiLdZVI1qmxavzmI3n96ZotOb53g26aIMI
QH8OGrpdzq9H9YG5mCkkGGr8mQEUug==
=w7ZK
-END PGP SIGNATURE-



[SECURITY] [DSA 3915-1] ruby-mixlib-archive security update

2017-07-20 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3915-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
July 20, 2017 https://www.debian.org/security/faq
- -

Package: ruby-mixlib-archive
CVE ID : CVE-2017-126
Debian Bug : 868572

It was discovered that ruby-mixlib-archive, a Chef Software's library
used to handle various archive formats, was vulnerable to a directory
traversal attack. This allowed attackers to overwrite arbitrary files
by using a malicious tar archive containing ".." in its entries.

For the stable distribution (stretch), this problem has been fixed in
version 0.2.0-1+deb9u1.

We recommend that you upgrade your ruby-mixlib-archive packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAllwxaAACgkQEL6Jg/PV
nWSQTAf/UK9Q1jyNQ22DT+Fb0UTbQsapPyBNaDbELLHnYeBL4cAr1xQ26NukBKKU
EVlmmDCO2O+WZXCysyuUfZvq45QImHQPfb07GGzscBbapMkvwKkhINI8Q4YPleAY
JmFA614+H3H4GqhkIMiC7ZZ5kPP0JaK2gVeuYNz1io1WsG/0WYY9Tf/lWWTnLtnS
dCs0YEG4DfNEwahVrCwrtIfNioVehDTQvH++vAWjTsoGqQj1wEk7ZuQQs7kS7xX2
LCe7qP1Lzv3i5dOWbuVs6ewBf2Ad/pH3DHKJit6keXFbECtinC52X/IcsOkeDMY4
qhCwriMsvQ1F1ac/LEG1p5uMLsqWHA==
=FL/h
-END PGP SIGNATURE-



[SECURITY] [DSA 3900-1] openvpn security update

2017-06-27 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3900-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
June 27, 2017 https://www.debian.org/security/faq
- -

Package: openvpn
CVE ID : CVE-2017-7479 CVE-2017-7508 CVE-2017-7520 CVE-2017-7521
Debian Bug : 865480

Several issues were discovered in openvpn, a virtual private network
application.

CVE-2017-7479

It was discovered that openvpn did not properly handle the
rollover of packet identifiers. This would allow an authenticated
remote attacker to cause a denial-of-service via application
crash.

CVE-2017-7508

Guido Vranken discovered that openvpn did not properly handle
specific malformed IPv6 packets. This would allow a remote
attacker to cause a denial-of-service via application crash.

CVE-2017-7520

Guido Vranken discovered that openvpn did not properly handle
clients connecting to an HTTP proxy with NTLMv2
authentication. This would allow a remote attacker to cause a
denial-of-service via application crash, or potentially leak
sensitive information like the user's proxy password.

CVE-2017-7521

Guido Vranken discovered that openvpn did not properly handle
some x509 extensions. This would allow a remote attacker to cause
a denial-of-service via application crash.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.3.4-5+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 2.4.0-6+deb9u1.

For the testing distribution (buster), these problems have been fixed
in version 2.4.3-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.4.3-1.

We recommend that you upgrade your openvpn packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAllStd0ACgkQEL6Jg/PV
nWRU9wf/dfBa7UxecYqbJDJukRYIhSTD43y7cu8UweGHiXtyRiMFasxOvJBeu9Pc
oDg9NnJ5fkEtUQuv7cElr5eMg9sHV/nJ2QYGuVT+8tesJmIPXji7n+ZGZAdia6Kf
U8Ach9xBHaK5Ao+/AhsYRj6fTnBD/uZryt3cS8Z22x6Iku3iJx1m/n0fBOT5mK6l
tK1wmD8nALl3RcS8ERYFAdeDQfKJ6tCyfYyddovy9kCd1NccDKbdx7/07MKUzfZo
VsojNsD6PTCyaUQNl7OaG3EkyPfYDsPGG0UrklSadzxSFD8ynFcjbGr5LmXPhBZ1
zoNdMXDi4M3jPJB6IyVsUW/7u3gBvA==
=Cuk2
-END PGP SIGNATURE-



Re: Broken signature for DSA-2040-1

2010-05-02 Thread Sebastien Delafond
On May/02, Francesco Poli wrote:
 Could it be a Sylpheed bug?

We've narrowed it down to an encoding issue: the original DSA email was
sent as ISO-8859-1, and mutt was able to verify it just fine; however,
on a system using UTF-8, any kind of pasting of the original text will
produce a file that gpg does not verify: that'll teach me to include the
é in my firstname instead of a plain e ;)

Cheers,

--Seb


signature.asc
Description: Digital signature


Re: How safely to stop using backports repo?

2009-05-28 Thread Sebastien Delafond
On 2009-05-28, JeffD jeff.dicki...@gmail.com wrote:
 Not automatic, but here is a quick script that might help you along:

 #!/bin/sh

 for pkg in `dpkg -l | awk '{print $2}'|sort` ; do

 if apt-cache policy $pkg | grep www.backports.org  /dev/null ; then
 echo $pkgappears to be from www.backports.org
 fi

 done

I don't think that can work, unless you make it something like:

  apt-cache policy $pkg | grep -A 1 -E '^ \*\*\*' | grep www.backports.org

to make sure www.backports.org actually qualifies the *installed*
version ?

Cheers,

--Seb


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org