The following updates has been released for Debian GNU/Linux:
DSA 4526-1: opendmarc security update
DSA 4527-1: php7.3 security update
DSA 4528-1: bird security update
DSA 4526-1: opendmarc security update
DSA 4527-1: php7.3 security update
DSA 4528-1: bird security update
DSA 4526-1: opendmarc security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4526-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 19, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : opendmarc
CVE ID : CVE-2019-16378
Debian Bug : 940081
It was discovered that OpenDMARC, a milter implementation of DMARC, is
prone to a signature-bypass vulnerability with multiple From: addresses.
For the oldstable distribution (stretch), this problem has been fixed
in version 1.3.2-2+deb9u2.
For the stable distribution (buster), this problem has been fixed in
version 1.3.2-6+deb10u1.
We recommend that you upgrade your opendmarc packages.
For the detailed security status of opendmarc please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/opendmarc
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4527-1: php7.3 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4527-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 19, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : php7.3
CVE ID : CVE-2019-11036 CVE-2019-11039 CVE-2019-11040 CVE-2019-11041
CVE-2019-11042
Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language: Missing sanitising in the EXIF
extension and the iconv_mime_decode_headers() function could result in
information disclosure or denial of service.
For the stable distribution (buster), these problems have been fixed in
version 7.3.9-1~deb10u1.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4528-1: bird security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4528-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 19, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bird
CVE ID : CVE-2019-16159
Daniel McCarney discovered that the BIRD internet routing daemon
incorrectly validated RFC 8203 messages in it's BGP daemon, resulting
in a stack buffer overflow.
For the stable distribution (buster), this problem has been fixed in
version 1.6.6-1+deb10u1. In addition this update fixes an incomplete
revocation of privileges and a crash triggerable via the CLI (the latter
two bugs are also fixed in the oldstable distribution (stretch) which is
not affected by CVE-2019-16159).
We recommend that you upgrade your bird packages.
For the detailed security status of bird please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bird
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/