-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5029-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 22, 2021 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : sogo CVE ID : CVE-2021-33054 It was discovered that missing SAML signature validation in the SOGo groupware could result in impersonation attacks. For the oldstable distribution (buster), this problem has been fixed in version 4.0.7-1+deb10u2. For the stable distribution (bullseye), this problem has been fixed in version 5.0.1-4+deb11u1. We recommend that you upgrade your sogo packages. For the detailed security status of sogo please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sogo Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmHDLnAACgkQEMKTtsN8 TjY6tQ/8Dp4Ps2CK0lHtd02Hlajl/GEnZaqCI4lY28QTkXPhJMXpb7yoiFvNzI+m OBx0by4PVYhvQXMVqRs5Bt/zYZwI88/5Rd2NAJsAo8/woFUprkaj4teg8TVjHaej oXeRy78FJ0q5L2tz552Lel3RG5L98Njs/StSaevNXbZFYMw+cJ0jwSGUC8npXiCQ ucvQzZVp6ZRERCUPrtx2nGlQPHAd+/TyCNVBV3/4prkRZ0FuFQEeVJBmWJnF7udW eRZjXfHW4awse1JB6YuRPdUQpomIcGrlIrll/0E/ASsbBTHhRrteCnufGlUyB2Y3 bUgzA/oOtmw42wu2KJs3Kyx7IfBgJu8SHB4Hu7oaC0DrKZlxYF5SxHddBjfDmz1A Z0I7UrpTMY0skMWZuL+4bXFfhH+6HQgozJ6nnT3fntPuQsRn2Sy2TT/B5bJ/o6yQ b8ZP5mhCTsM1AUXOAjFfx1t9Qu0UExTRVmLaI8E92vBv2d/Xggr2yQ6ED35AxVy8 dBEgbglYfQ7QaZZH+Jvvum4TBKOUbmbXRgsoK0kwPzmjsAtE9iHfe9RR1tQ/qP+9 D/IW0RB0/Yi+Q05XMXpb6Rbx3jIK8A6qtwKnvGpL9ocuDuZ8zTFXISWsAyaNUb/w e77PqzquHAL/KM/Ww0hBXAHZAxo4bbWT6ywa09v/ureJbuum8k8= =6vm/ -----END PGP SIGNATURE-----