Debian 10229 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 8 LTS:
DLA 1826-1: glib2.0 security update

Debian GNU/Linux 9:
DSA 4466-1: firefox-esr security update
DSA 4467-1: vim security update



DLA 1826-1: glib2.0 security update




Package : glib2.0
Version : 2.42.1-1+deb8u1
CVE ID : CVE-2019-12450
Debian Bug : 929753

It was discovered that GLib does not properly restrict some file
permissions while a copy operation is in progress; instead, default
permissions are used.

For Debian 8 "Jessie", this problem has been fixed in version
2.42.1-1+deb8u1.

We recommend that you upgrade your glib2.0 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DSA 4466-1: firefox-esr security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4466-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2019-11707

Samuel Gross discovered a type confusion bug in the JavaScript engine of
the Mozilla Firefox web browser, which could result in the execution of
arbitrary code when browsing a malicious website.

For the stable distribution (stretch), this problem has been fixed in
version 60.7.1esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/



DSA 4467-1: vim security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4467-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : vim
CVE ID : CVE-2019-12735

User "Arminius" discovered a vulnerability in Vim, an enhanced version of the
standard UNIX editor Vi (Vi IMproved). The "Common vulnerabilities and
exposures project" identifies the following problem:

Editors typically provide a way to embed editor configuration commands (aka
modelines) which are executed once a file is opened, while harmful commands
are filtered by a sandbox mechanism. It was discovered that the "source"
command (used to include and execute another file) was not filtered, allowing
shell command execution with a carefully crafted file opened in Vim.

For the stable distribution (stretch), this problem has been fixed in
version 8.0.0197-4+deb9u2.

We recommend that you upgrade your vim packages.

For the detailed security status of vim please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/vim

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/