The following updates and notifications has been publish for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-129-1 mysql-5.5 end of life notification
Debian GNU/Linux 9:
DSA 4454-2: qemu regression update
DSA 4457-1: evolution security update
Debian GNU/Linux 7 Extended LTS:
ELA-129-1 mysql-5.5 end of life notification
Debian GNU/Linux 9:
DSA 4454-2: qemu regression update
DSA 4457-1: evolution security update
ELA-129-1 mysql-5.5 end of life notification
Upstream has ended the support for the MySQL 5.5 release series, and since no information is available which would allow backports of isolated security fixes, security support for MySQL in wheezy has to be ended as well.
Support will end on June 30th, 2019. Any serious flaws that are discovered before then will be backported if feasible.
DSA 4454-2: qemu regression update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4454-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 06, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : qemu
Debian Bug : 929067
Vincent Tondellier reported that the qemu update issued as DSA 4454-1
did not correctly backport the support to define the md-clear bit to
allow mitigation of the MDS vulnerabilities. Updated qemu packages are
now available to correct this issue.
For the stable distribution (stretch), this problem has been fixed in
version 1:2.8+dfsg-6+deb9u7.
We recommend that you upgrade your qemu packages.
For the detailed security status of qemu please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/qemu
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4457-1: evolution security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4457-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
June 07, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : evolution
CVE ID : CVE-2018-15587
Debian Bug : 924616
Hanno Böck discovered that Evolution was vulnerable to OpenPGP
signatures being spoofed for arbitrary messages using a specially
crafted HTML email. This issue was mitigated by moving the security
bar with encryption and signature information above the message
headers.
For the stable distribution (stretch), this problem has been fixed in
version 3.22.6-1+deb9u2.
We recommend that you upgrade your evolution packages.
For the detailed security status of evolution please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/evolution
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/