Debian 10226 Published by

The following updates has been released for Debian GNU/Linux 8 LTS:

DLA 1762-2: systemd regression update
DLA 1766-1: evolution security update
DLA 1767-1: monit security update



DLA 1762-2: systemd regression update

Package : systemd
Version : 215-17+deb8u13


In the recently uploaded systemd security update (215-17+deb8u12 via
DLA-1762-1), a regression was discovered in the fix for CVE-2017-18078.

The observation of Debian jessie LTS users was, that after upgrading to
+deb8u12 temporary files would not have the correct ownerships and
permissions anymore (instead of a file being owned by a specific user
and/or group, files were being owned by root:root; setting POSIX file
permissions (rwx, etc.) was also affected).


For Debian 8 "Jessie", this regression problem has been fixed in version
215-17+deb8u13.

We recommend that you upgrade your systemd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

DLA 1766-1: evolution security update




Package : evolution
Version : 3.12.9~git20141130.241663-1+deb8u1
CVE ID : CVE-2018-15587
Debian Bug : 924616


Hanno Böck discovered that GNOME Evolution is prone to OpenPGP
signatures being spoofed for arbitrary messages using a specially
crafted HTML email. This issue was mitigated by moving the security
bar with encryption and signature information above the message headers.

For Debian 8 "Jessie", this problem has been fixed in version
3.12.9~git20141130.241663-1+deb8u1.

We recommend that you upgrade your evolution packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

DLA 1767-1: monit security update




Package : monit
Version : 1:5.9-1+deb8u2
CVE ID : CVE-2019-11454 CVE-2019-11455


Zack Flack found several issues in monit, a utility for monitoring and
managing daemons or similar programs.

CVE-2019-11454
An XSS vulnerabilitty has been reported that could be prevented by
HTML escaping the log file content when viewed via Monit GUI.

CVE-2019-11455
A buffer overrun vulnerability has been reported in URL decoding.


For Debian 8 "Jessie", these problems have been fixed in version
1:5.9-1+deb8u2.

We recommend that you upgrade your monit packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS