-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2976
                          bacula security update
                              31 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           bacula
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-11061  

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2353

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running bacula check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2353-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
August 29, 2020                               https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : bacula
Version        : 7.4.4+dfsg-6+deb9u2
CVE ID         : CVE-2020-11061
Debian Bug     :


An issue has been found in bacula, a network backup service.
By sending oversized digest strings a malicious client can cause a heap 
overflow in the director's memory which results in a denial of service.


For Debian 9 stretch, this problem has been fixed in version
7.4.4+dfsg-6+deb9u2.

We recommend that you upgrade your bacula packages.

For the detailed security status of bacula please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bacula

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAl9KxmhfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy
MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7
WEcNGQ//bmRZ9xcf6Y43WMFd9pugWxeYlm5SFX3CSFuvb3kFx1HuSEclG583lYm3
iuvFuCZZrtGVQHX9u6JtoSeIazRLNfo9DijXc7p42trGH5W9Iy2kdhdNKZVbW6Qu
SsMGQm1WeUrv56HAc+5PdUcli0w13CYLVh/wVR9d7Lxx6j5NVMCDnhnFHDq2iEQV
S2/u9Y+u+Fgx3zN0FT02vHIodVeUUMFp4twNJDyAhFrpa2AZPBq7hVhrPZo7p1j3
MPW7A7VXtldLxh5WIxLmRNJUq2QnmqNHKpvlpajAapL5PgSbtKutGfOjdgNKbvee
3Xe9j1JMyW3AryeHIBf4vSwT224UFZ3qogD5RB2B9Fv75DKwov5Fn4zEQbYwRQEr
sBPnEdJ7emzca2DLW/OdIi9KunmgAkhMSqBMl/YpqQstdU8NK9Nt4b3HsJMNFYh1
Jy8UhI2N7tOoxOpeiJADRlQIgt3vipx3SWED0vZHpGwAp/48oXM1ChM5FIEZQjOS
1HEdkcLGyuxdCdb3E/WnVF1REhkOp0nTCXsncF9KG1yxqvXBcQfMU8/ua/CVrHdR
cDs0TT/2YtTRmcc5YCUvdLleLzE1OXIczNOaWsCuGfjArwyLmESMCcf9myo/0umH
5J3ITrBo3y8VFTVdQxFxF6TMn8xprkAyyhnPxfMTH5ib8If7ng0=
=uL0H
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=vfNP
-----END PGP SIGNATURE-----