it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 4822-1] p11-kit security update
- Date: Fri, 01 Jan 2021 07:03:54 +0000
- List-archive: https://lists.debian.org/msgid-search/E1kvETa-0003t7-3I AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=vCp8eqUnyUQoBd2vyqcwjuG3wXsOYPaNrunq/6APoZw=; b=bJ S82EQo4Rk3khSqjgamm3Lb1MnHRz+llamWeBUyznBbLnXMtgYnXzFqL/Ehk9Eo/yqTWRfFs0oIXMB mkqt5JpynWPTKAMCBKq3ptzN0BvwnjPpPuS+KgNt14QanU9dIu6mEJlSbscXRKKEW1QZvZez6Kfsj RzWU8CHlqu6jHH5GJAtYJ7smL1VBaxpgVDjjRTeCS2A/Dl18clPQbvW0ZDwKbnt9xwauwtize1QGo 8feos09QJl/3GGnI23TW8rka3BI7SEYohu/97Jqk8k/HbnAbG5r9+bHRIf1GuOrTS5Xw3YeJmDbnU lO8gmjL7AZYfl/bbiaYj46e8c/7VxsJA==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 1 Jan 2021 07:04:13 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <ouiQAMDuyQD.A.b7C.tls7fB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4822-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 01, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : p11-kit
CVE ID : CVE-2020-29361 CVE-2020-29362 CVE-2020-29363
David Cook reported several memory safety issues affecting the RPC
protocol in p11-kit, a library providing a way to load and enumerate
PKCS#11 modules.
For the stable distribution (buster), these problems have been fixed in
version 0.23.15-2+deb10u1.
We recommend that you upgrade your p11-kit packages.
For the detailed security status of p11-kit please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/p11-kit
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl/uyMNfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0RuRQ/+OOn59gJBnV0cOS4x/form65EYRvQEEY9r35HYAFGYnu/m0C9J6+89K+2
BKyGaApSH4+6Er7YC4ieRy3U+bZAhHJru44hi5vUI5Hl6p/nLQz0XLC5wJB6Y3mB
PoNlqSaT6NDLLgig/eTZcGDL6nuwrZ1r3iL1SSf70NdJ6UqvwyiJTB4I1RjYwilQ
SxcW2PrbZU/ZRRP8YfGR0n9YKYM04YK8v7SklhRyMB4+GAcE/YPpVlUSwKq4dCmJ
2Cz6fzHdL36guGKxo5E9CLEqWY0+R99rvaWU1NZp90QIw0HzBkG/4Ofrk1cW7Iny
/MIkpGWYc4Fe3JVAV+n3TijuAQ72HtU/XXTEMjOCKR7TtLJlXt1pSEkv3AHdGHth
XXI+jajF/ACFIa+wnSurwMimd2aeiiZNSL59bk6zZw+9Rix0396B3IUQuJrdnZhA
YD6P70b4jGyqM8sHH9kAhym7aPFH6KVjp2ievMgxktK4FLcDcE+K8ElT3TjQmyzZ
1Rsgxa0IIL/ej512MRFugPNCVmFym7ZmN7edApMuqgOv4eNvAIqvGtbTsm3Vp5YY
nULpe5iNooWEcEs5tn5CX/dgK7/RKV0I+1Matfd4tb7nVEd9o1doYDe/9ldRO1UH
nCpaIbr5dlohLZ4OHl8nwZqyENQF59TEdhnbXTSci+WX+MU9Iyw=
=d5SK
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 4822-1] p11-kit security update, Salvatore Bonaccorso, 01.01.2021
Archiv bereitgestellt durch MHonArc 2.6.19.