The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 8 LTS:
DLA 1826-1: glib2.0 security update
Debian GNU/Linux 9:
DSA 4466-1: firefox-esr security update
DSA 4467-1: vim security update
Debian GNU/Linux 8 LTS:
DLA 1826-1: glib2.0 security update
Debian GNU/Linux 9:
DSA 4466-1: firefox-esr security update
DSA 4467-1: vim security update
DLA 1826-1: glib2.0 security update
Package : glib2.0
Version : 2.42.1-1+deb8u1
CVE ID : CVE-2019-12450
Debian Bug : 929753
It was discovered that GLib does not properly restrict some file
permissions while a copy operation is in progress; instead, default
permissions are used.
For Debian 8 "Jessie", this problem has been fixed in version
2.42.1-1+deb8u1.
We recommend that you upgrade your glib2.0 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 4466-1: firefox-esr security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4466-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2019-11707
Samuel Gross discovered a type confusion bug in the JavaScript engine of
the Mozilla Firefox web browser, which could result in the execution of
arbitrary code when browsing a malicious website.
For the stable distribution (stretch), this problem has been fixed in
version 60.7.1esr-1~deb9u1.
We recommend that you upgrade your firefox-esr packages.
For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4467-1: vim security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4467-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : vim
CVE ID : CVE-2019-12735
User "Arminius" discovered a vulnerability in Vim, an enhanced version of the
standard UNIX editor Vi (Vi IMproved). The "Common vulnerabilities and
exposures project" identifies the following problem:
Editors typically provide a way to embed editor configuration commands (aka
modelines) which are executed once a file is opened, while harmful commands
are filtered by a sandbox mechanism. It was discovered that the "source"
command (used to include and execute another file) was not filtered, allowing
shell command execution with a carefully crafted file opened in Vim.
For the stable distribution (stretch), this problem has been fixed in
version 8.0.0197-4+deb9u2.
We recommend that you upgrade your vim packages.
For the detailed security status of vim please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/vim
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/