-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 29 Jul 2019 10:50:51 +0200 Source: otrs2 Binary: otrs otrs2 Architecture: source all Version: 6.0.20-1~bpo10+1 Distribution: buster-backports Urgency: high Maintainer: Patrick Matthäi <pmatthaei@debian.org> Changed-By: Patrick Matthäi <pmatthaei@debian.org> Description: otrs - Open Ticket Request System (OTRS 6) otrs2 - Open Ticket Request System Changes: otrs2 (6.0.20-1~bpo10+1) buster-backports; urgency=medium . * Rebuild for buster-backports. . otrs2 (6.0.20-1) unstable; urgency=medium . * New upstream release. * Bump Standards-Version to 4.4.0. . otrs2 (6.0.19-1) unstable; urgency=medium . * New upstream release. - Fixes OSA-2019-08, also known as CVE-2019-12248: An attacker could send a malicious email to an OTRS system. If a logged in agent user quotes it, the email could cause the browser to load external image resources. - Fixes OSA-2019-09, also known as CVE-2019-12497: In the customer or external frontend, personal information of agents can be disclosed like name and mail address in external notes. * Merge 6.0.16-2 changelog. . otrs2 (6.0.18-1) unstable; urgency=high . * New upstream release. - Fixes OSA-2019-06, also known as CVE-2019-10066: An attacker who is logged into OTRS as an agent with appropriate permissions may create a carefully crafted calendar appointment in order to cause execution of JavaScript in the context of OTRS. - Fixes OSA-2019-05, also known as CVE-2019-10067: An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS. - Fixes OSA-2019-04, also known as CVE-2019-9892: An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files of OTRS filesystem. . otrs2 (6.0.17-1) unstable; urgency=medium . * New upstream release. - Fixes OSA-2019-02: An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS. Checksums-Sha1: 783e83f9eee112bb7f0d90a5bd832ce0ab8cf13d 1843 otrs2_6.0.20-1~bpo10+1.dsc 5ed88d9650b0931b002dd579e182dc71c3be2aa8 25562981 otrs2_6.0.20.orig.tar.bz2 b101471c8854659ea30ddc5c1862239b5215fa7c 30004 otrs2_6.0.20-1~bpo10+1.debian.tar.xz 333462a95675b0a2b6d20ad467d2bd6da381bc5d 9765328 otrs2_6.0.20-1~bpo10+1_all.deb b97cff6180b2bc7ab18519eeb8460df91e48b65f 5490 otrs2_6.0.20-1~bpo10+1_amd64.buildinfo 7cce399878e99e6cffe44de5224fd4a52c6c3d89 251616 otrs_6.0.20-1~bpo10+1_all.deb Checksums-Sha256: fd9f64db4cf46bf300a0413b67251a753bc92242361113444283d1a3e4b584f0 1843 otrs2_6.0.20-1~bpo10+1.dsc 9679fd0ca2bde8f2d6b6279f5696c1f83f54358d1b0eecd7695a54e0b1e3c775 25562981 otrs2_6.0.20.orig.tar.bz2 538be2c7050452f7cc6bc4be658b550cb8b633a59c4a1198c3ee6f7fc958df14 30004 otrs2_6.0.20-1~bpo10+1.debian.tar.xz 591f0c493d3dc80dfc08546c21749883641a2b310cde1f76e6a292dfcb76e222 9765328 otrs2_6.0.20-1~bpo10+1_all.deb 30ce0b15eddd58259811fbed196686bb14cb66e04d65bf0d7b246f0c4b7e39da 5490 otrs2_6.0.20-1~bpo10+1_amd64.buildinfo a528bd760cec4c91c336857c5d0165ff58146179ebc448796647354b2916e73d 251616 otrs_6.0.20-1~bpo10+1_all.deb Files: b1061d918a088147ba6d0b105a1fe2b2 1843 non-free/web optional otrs2_6.0.20-1~bpo10+1.dsc 74c49090211dc1155e9bfc84b1726f3f 25562981 non-free/web optional otrs2_6.0.20.orig.tar.bz2 af9d8ce3f7069e9c9307caefa949b378 30004 non-free/web optional otrs2_6.0.20-1~bpo10+1.debian.tar.xz 5f06bdabc17353409b0d60ca71865a89 9765328 non-free/web optional otrs2_6.0.20-1~bpo10+1_all.deb f78a76e3241e8fec17067d1284f96d78 5490 non-free/web optional otrs2_6.0.20-1~bpo10+1_amd64.buildinfo aafad697b5abcf909276c25c06329723 251616 non-free/web optional otrs_6.0.20-1~bpo10+1_all.deb -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEWKA9xYJCWk3IuQ4TEtmwSpDL2OQFAl0+tooACgkQEtmwSpDL 2OTbTQ//YIifJdE1I0YgYlOBjIQFhLnfiJN6qO2EbbsKBbzziApLuF6Q8ywvK0l8 rxoUvynqZeZaSznzqFCMKZ80+usswXCVjhKFEImdiUFaMSGH4yAElN7WsN1WE6lX 8b7VKZ0cKrKAFfHXCGIHqOgng/kVYyeasZWgIdsoE0aDtmlSOn/Z845ZcTl8hH+y CXFXbcBpR8elsJp7Ejcd1RHg/lHK7ijOMb4r1hfUfKW9074NBMXkB9tNX+hcX+Hv wT7Nv8M9XIZp+XeA8d7PlYwBZtSZGrFMHSMXH2RMB2y63eFGq6NqqICG3wBWht1Q 1K0yOKzvy3JqVbbfv6qE13hXuMcF+RX5s0pI/VSTo/qmMbPUMEByTXHoN/DDmn2k qNSjWSE/A3l1WBT8pCkYGUFe0ZAg51h8ywG4GfFHBomrpkAUqFKjNMbWVx4k8C+N qABxmdcmM39VH9hK72XKV8WKBibNywMEw9tDZTr7ZhB1w0zW892p35eSScX/FsIy IuBmYyNfOytInLgI4fpqyPp1RP5O6UJlT/ojUEB0fVLpw6UxsPfnzLUdSaeSSfOa sWwi4tUMuKqBeg+Y+QdaQjzm1NARKTRk8ZL8HIqAJBKxAOUc4D/As1N4u+aQ4jtY 6DaCX+Q5zejPBRgURtKVpD3oWdmZLcqrdA1iFhZ4Pkf9+y1AhNE= =zxdD -----END PGP SIGNATURE-----