Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4354 mesa security update 18 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: mesa Publisher: Debian Operating System: Debian GNU/Linux 8 Linux variants Windows Impact/Access: Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-5068 Original Bulletin: https://security-tracker.debian.org/tracker/DLA-1993-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running mesa check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- Package : mesa Version : 10.3.2-1+deb8u2 CVE ID : CVE-2019-5068 Debian Bug : 944298 Tim Brown discovered a shared memory permissions vulnerability in the Mesa 3D graphics library. Some Mesa X11 drivers use shared-memory XImages to implement back buffers for improved performance, but Mesa creates shared memory regions with permission mode 0777. An attacker can access the shared memory without any specific permissions. For Debian 8 "Jessie", this problem has been fixed in version 10.3.2-1+deb8u2. We recommend that you upgrade your mesa packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXdICIWaOgq3Tt24GAQinRQ//YGONfcsr5OxAy0MbiwIuf3lKJke7bsgS UGpWlmqbKpLEATIRFIBTQ8L1QlhxbOwXYcbqHIqUn2HFdclEacRQtCqBfau5TOjn WQdd2VbMWJCA3lyPYzLm2qyhlFQIQPxjjWjFLY0nwjfOZAdXvUqo7642zAmc8Yy7 msX7Klq4gjoZiEnWb0DQvuLBMRox7VlXyLjv0nnxcg2Ud+70fLXtwRwxuJnEmlQM 14OzTUs7s78EEK9eu2coD6BtSGR1Qtu0eDe6jTMjutixMit9DWuCtiwxVQle1WM6 PgOja1s3KTx37XtFCOwTfzbW2Y7x1yWAO/H7EBkNqyhLcuGgah9qPO70GODcyw6P IHg4ytMkItS76al4yco4rzpOd1ym+zVdGMjcJx2tv3D/lfN9pHV/JpJBK2OK5GnL Ac7sBwEZVkgxYX7YnaXCMvZJbsI+swWA4+HKOYp0YmlC8g4GPXcmC8SNbCK61efd VLe78ibJuG/4jwFNehYshWHPPXdSd7vy0pQXRA28Wg8FZYb3bj6Mwr3B389RxZVD VYZ/vFyh8sjI2ZdHzbxwHlQmUtG2XsT91k8F+uXUlodmOGDK+gUrkjL4F0ENy0uQ 8DkoUlOb1njiKQc4SNRs29i66bJb6ReA889TdrVclhZVdPbS020aSii7TaulwLBH Xe4vjl8Mz+g= =XsAB -----END PGP SIGNATURE-----