Debian 10222 Published by

The following updates has been released for Debian GNU/Linux 9 and 10:

DSA 4556-1: qtbase-opensource-src security update
DSA 4557-1: libarchive security update





DSA 4556-1: qtbase-opensource-src security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4556-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 31, 2019                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package        : qtbase-opensource-src
CVE ID         : CVE-2019-18281
An out-of-bounds memory access was discovered in the Qt library, which
could result in denial of service through a text file containing many
directional characters.
The oldstable distribution (stretch) is not affected.
For the stable distribution (buster), this problem has been fixed in
version 5.11.3+dfsg1-1+deb10u1.
We recommend that you upgrade your qtbase-opensource-src packages.
For the detailed security status of qtbase-opensource-src please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qtbase-opensource-src
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

DSA 4557-1: libarchive security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4557-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 31, 2019                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package        : libarchive
CVE ID         : CVE-2019-18408
A use-after-free was found in libarchive, a multi-format archive and
compression library, which could result in denial of service and
potentially the execution of arbitrary code is a malformed archive
is processed.
For the oldstable distribution (stretch), this problem has been fixed
in version 3.2.2-2+deb9u2.
For the stable distribution (buster), this problem has been fixed in
version 3.3.3-4+deb10u1.
We recommend that you upgrade your libarchive packages.
For the detailed security status of libarchive please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libarchive
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/