lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20200203212136.mdsiogf2yqn2fcit@seger.debian.org> Date: Mon, 3 Feb 2020 21:21:36 +0000 From: Moritz Muehlenhoff <jmm@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4617-1] qtbase-opensource-src security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4617-1 security@...ian.org https://www.debian.org/security/ Moritz Muehlenhoff February 03, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : qtbase-opensource-src CVE ID : CVE-2020-0569 CVE-2020-0570 Two security issues were found in the Qt library, which could result in plugins and libraries being loaded from the current working directory, resulting in potential code execution. For the oldstable distribution (stretch), these problems have been fixed in version 5.7.1+dfsg-3+deb9u2. For the stable distribution (buster), these problems have been fixed in version 5.11.3+dfsg1-1+deb10u3. We recommend that you upgrade your qtbase-opensource-src packages. For the detailed security status of qtbase-opensource-src please refer to its security tracker page at: https://security-tracker.debian.org/tracker/qtbase-opensource-src Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl44jm0ACgkQEMKTtsN8 TjaWbRAAr6uzwH3o/0QYoqwK2cyYoT45QJ7Wpdal8VmcAOEJMjGee3a/M5KzWt76 Iv9VCwbw1bi6chwVRxugAHSWjEZ1Lnz0KRzthGTK2ILkMqY+ZSMJ5cGCvjk5SoLh SJ1SFK/nLBkUw8kU4D6MAc8177dZspIZSnQQz92Xyv0gzxWH/7NGCOOLwf4JYdHg y/ynubZeJCUelam9iJA3bIIL4/abC9eti6pSV/CkbTmB7TgTz7Awx9orkir23PKW 8PJP9noNEoYOCf/SceUrnGRhcjvrOoPQHOUkVwohEL05o3bzZKzDrP5FTOzqwCdb QUaA7lmOUTQzEudLHZVlXKCyAzTOw7mdvxaQLAVJwvvBrhyKZ5DxTJdynSlWx3k1 kyOet+EmRA92hjNhWek5qCP3XWDMIgh1AF/hkPStqc1cr9TCSWsuKG3kSx95sVaw /J0uC5RHdMw6kRMzYsmH5Vg9dF8bM1zuKwYFv1Ea9ZJAnyJ0oV78zl1wlb+yRN0S 1ctSbBN3Nk/Ulc9H09OajAtfU2DCh1CZSUwMi8MuM7Ir8ify0C8AwSAnCe6cXaf+ ssXtbm04VyeRdVr6JOMiH0rMfmWHWDlY5JrCWn6Fd+w1SuUPQl+vjql8n2JbH1IW bamGZL8vRWWG+cqFiMgsFcRCcq4ysu1FqlsQ0NTre6EEWspks2I= =IKnj -----END PGP SIGNATURE-----
Powered by blists - more mailing lists