Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2607 kdepim-runtime security update 31 July 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kdepim-runtime Publisher: Debian Operating System: Debian GNU/Linux 9 Linux variants Impact/Access: Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2020-15954 Original Bulletin: https://www.debian.org/lts/security/2020/dla-2300 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running kdepim-runtime check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : kdepim-runtime Version : 4:16.04.2-2+deb9u1 CVE ID : CVE-2020-15954 It was discovered that there was an issue where kdepim-runtime would default to using unencrypted POP3 communication despite the UI indicating that encryption was in use. For Debian 9 "Stretch", this issue has been fixed in kdepim-runtime version 4:16.04.2-2+deb9u1. We recommend that you upgrade your kdepim-runtime packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAl8iqeEACgkQHpU+J9Qx HlhCvBAAw9g7DR7id3eEqZPv2HY41C0N/7GNdeHi99v39PG5TIewTWXIMIR8Qasr ED+cU6S2Vb8OnroiWMBPwJ811ZuUjOkCEI5naRwI6TtAquEYUZq0VQLgbzaSjsNt MncGWxhM7+sYa+nxZSjG6QSWaCoaVMzFJkFNJp+1y/HGv7poMcblD7aT2olTQPiX HIdoAr0Bn2K3JgBf17btDbnzkO7B+Xf9lphFSBMmQc4YVYabCmvu2lmMh3nZylaF ykk52pZh8oIkv7Eka04pjUyIYWXf+lEa75T7XYxsLya4I8tuKOpw2UeUFszLp1Tt NQSvb3L+/Kqr/WXVY9VHu87KpFny2smmhxZoFWo2G8yVOLDAXyXCLg7/dNURMEe3 BQK7OmDnrh1rMFoZDSAYv+USXG8Tthhv52FF/0jJjyaz1aRCcmWKOOiVY9x7AKoN Sh8TYIeBTURVnytRL7ue48fusY1G/Fak499B3gp0WspUCFapDDhABRutNBlbylJu mbpn9lAVJyJL24Aa6WSU4nSHcYcCDI0JVx7uxKhph/77WrXR9W1Xyrk28mrG7cGz r0eETfaGHisEWQsMOk5nS1IJoEtemHFxGoWp87JGhSF5P3ydffdMM4JyAvLXepwY cvNLbQeUSI8u7sVLtLJXExqAPd8FyMsMhr5sFRgpZzOLx8y150o= =vWeC - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXyNmHONLKJtyKPYoAQgAPQ/8CFOk4JdZ9nSiOVQ1TXYN0gqtpUVW7kda eNiCg9xdvndzaUKR8xBFmzRH4zkIRBieS4El4s7/5Y1hlB41P6LQS2CS646z/V+S hD6qR6RKzaPwIbkSew8VfLFWQHyO3pIeJZhzPr34EkscbOihQc1FENj2Q/Rp9leW 7Jok6ZHF41EV2yA7VcH+I3ntoVcRlBBNxMzoz588y5naLAAm5pQvy1ncugl1crjl lTi2MGyaFov/5Kcpp7mz/QP+rUIMgvnJwSSwt0ZbCcXMgTTU9bdqXPVH9yKFlnzF jXtdNRqsfnbyWihn27PnsnvnEMzZgkvyaDXCZnADUzjNEyU4/Q/p/Jn3AlSCL+ul Lzpx0VUKpfmymZJZEHTwnoYq8sJkLurFstDn6JGpt40IH5W489eLl6AC6lBWiBXP rop4Aw3bO3k2K6XXguM+FM0WtKntPwZaxD3JIPNOKX7xsEqjdSTesENFOZzC0gBN wXoxM7esc1fsURv6HhsDmOwJKhR+UX8xw3Y9liWaEUY4cSdweqycAgk6x7FlZMyu hqansiYZUaB9AYkmOPj74ltQLdNwAcK2pmb07GecRLIquk8AZxUEfZrDHFVKLRmv KvpEvl8TTs91MneuXMbQD55MIUmeJ0+/wt95Mn9psRxBmEEqaONB6asg0blc32+z Jok+sA9KAT4= =C4Al -----END PGP SIGNATURE-----