[SECURITY] [DSA 4611-1] opensmtpd security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4611-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff January 29, 2020 https://www.debian.org/security/faq - - Package: opensmtpd CVE ID : CVE-2020-7247 Debian Bug : 950121 Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of email addresses which could result in the execution of arbitrary commands as root. In addition this update fixes a denial of service by triggering an opportunistic TLS downgrade. For the oldstable distribution (stretch), these problems have been fixed in version 6.0.2p1-2+deb9u2. For the stable distribution (buster), these problems have been fixed in version 6.0.3p1-5+deb10u3. This update also includes non-security bugfixes which were already lined up for the Buster 10.3 point release. We recommend that you upgrade your opensmtpd packages. For the detailed security status of opensmtpd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/opensmtpd Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl4yAAEACgkQEMKTtsN8 TjZY1g/9F3JfNN3g0Exzq/KEl1IspVC1RwGKq89wMktQ0Jyhbh/h1RKdeb81geCk 9ZzwJW5R2I6VSL1CJBtBmlPBjBUtYQyok27cKuTg8fk3YJfs/AC1dWkfijPF/6OO Kb7Kd/96dSQZUYx7+vYWcy7v0/kEPWrUUKdw78nO0bBZoua+L8XuB+u1lCy2kx0C cKIB6qEtqAXGUFkC/VALKafwt1FaRnQ5YeUICyu3y77ZLPysVdxFWtz1RrqgRDUs LuSVz5MZ/KHC7+zU7SubFI7dtltJKEOnaDeisdykY5gjsjykVUZMmIvjsyUTzNNI jwXQYh9DySlk/y5/O0NlDtjxC7ccFea50Mdm1OPIR7utWNzYTqAEzzooXiNfezpK hDh06vmNALi3KRb6sauYdrK+3gmhvZj2YYzYdQCp7zyUDJLIdC1cuykK/ZyL53Yq teQSs8BRRqxbTCn2RE/vPbEaE27WZDQyoUy8Kj0CqtuInQwR4cQA+cOE5a+1bLqt mltYDsZo8sV9nq/LbNHJif7uFAk6huUIYPje9H9AgA2j0BC62eK+XC7m3UMoeemv UTvI9NURXCnC6i8N+XczNi7szbGcsp1pyz9mORr7ZvA/yz6bXgoMIrQY5hepaFyF vk97cxfEn9dEWm9rl6xaXaPEH0jc4VCigv0Gv+3PS8yt/U2Qy9k= =tabP -END PGP SIGNATURE-
[SECURITY] [DSA 4610-1] webkit2gtk security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4610-1 secur...@debian.org https://www.debian.org/security/ Alberto Garcia January 29, 2020 https://www.debian.org/security/faq - - Package: webkit2gtk CVE ID : CVE-2019-8835 CVE-2019-8844 CVE-2019-8846 The following vulnerabilities have been discovered in the webkit2gtk web engine: CVE-2019-8835 An anonymous researcher discovered that maliciously crafted web content may lead to arbitrary code execution. CVE-2019-8844 William Bowling discovered that maliciously crafted web content may lead to arbitrary code execution. CVE-2019-8846 Marcin Towalski of Cisco Talos discovered that maliciously crafted web content may lead to arbitrary code execution. For the stable distribution (buster), these problems have been fixed in version 2.26.3-1~deb10u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl4xoBMACgkQEMKTtsN8 TjYNtg/8CEOnsVaL2y0V4B88cNFgDzXLSUhMHsrCf2OlTWkPYDgw1UkZS8SPYTP1 SFVY+nYigD9i36zKPjhwljizlJjUXXNkSw0KwOwvvSC4wQYgZ8453qTgRFe4/tCM SROpoAQkyLBTKS0Mjav4huUMwsxHQETUPhRhN+53i/DfdX55au7/MUWmpMbXAoqj AGIFr/jYutKwvNxP5jPDuQSJLlvR5LvH8wHMde+3r29wwvIs140BMez7mgX0Ats+ kwUtea18kvrY1XREE8erHtTarTWFPzHSNZnh3mgDAoZH8wrOMNvCniF9iuaDI3iN GVieD187vkZ1L1QxV2JvqI146Gtzjg2YAMPFc3ZFyy8WueD0wrkKLExTxhTnooBr gMMslVEkHbjt8Vjd0RezMyXr6QeOB2r0nlzQ0qcpI7k/0FXck7U0OBRpEl4sTM+f AgnscKuphcewAvoxl7KUzABqgF3D6pRWSMKGXQrmuR8tY+g6NMKMD3kvwloCdH07 IHp+skyHmNFNPz/xCVBkuKSzr0B9oyVubvksKGn/NKpGvW7VA7/cQQJJ/K+TkVAI pp5kX4jLkRgI5ZZJhPlibXkUbAB3upJwuAJJYR/TERBwpYBislJOV8pAgiqnlKRJ N+QZtoT9wXFlgofkONP7+gkrLYhfP4f3iSYUZi6BNL62mVCBY24= =p/ML -END PGP SIGNATURE-