it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 4847-1] connman security update
- Date: Mon, 08 Feb 2021 20:02:58 +0000
- List-archive: https://lists.debian.org/msgid-search/E1l9CkM-00049K-6q AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=Am2Gl8bUDHXvOmBySmrBuaMjRGB+LXLy/AH5DVuoT5o=; b=f4 j2bKJkGUWRr9mBKi/QPVSRxXLtGtK2bNQfjl39if9WPp9xWSvbTOjFdN4gN1swlP9Mk8H/Aycf0po TOJxKDOJt/rs4WZNo5tkM1yVTe3PrXGGEF44yT2au6Btat80c94ao9/ZRuLk3K9YmXMNNs7mV6ONx sNGL3p4QD7LhjW4gr7xqqGwbnpr4Yxo2W19D/oK4lmMY9uwoGoA2g//mYXMoReX9pnRPr1GPg5qtV /5Td+JIemJQREcS7B/xLiPSgs9IiOF9DDcKm/z1ZnEOzweAvO3HRLZ+TAmrQPN05gugAigIYI9m18 I0h3wleJNeNouzCofpvaKi9S5a0wDdpw==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 8 Feb 2021 20:03:14 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <caSY9cDQcdB.A.N5G.CkZIgB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4847-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 08, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : connman
CVE ID : CVE-2021-26675 CVE-2021-26676
A remote information leak vulnerability and a remote buffer overflow
vulnerability were discovered in ConnMan, a network manager for embedded
devices, which could result in denial of service or the execution of
arbitrary code.
For the stable distribution (buster), these problems have been fixed in
version 1.36-2.1~deb10u1.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/connman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAhl9pfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0ToGg//e9ZijJG7S7wkyc4I+q+1Bn1kPikXh4osJ9wgNSUKdcsIGWpjAvnW+X1H
WwT5OI+7BeuAK1uAvGIuDK5s6cPsaa8NUKLsAwgKKcwCJcN74wLKls+3j7vt4nQA
ynenKrwYBxxdfq9oUFPIvMhWggZ5a1LFqbgLeXnQc36IGAJSpkCMogJpOIQqc3Ed
Xi7I7TKk3l2rxsvNxD+qPaRp+0p81trEcX7M81yhEBpg1q2UeEKLrDWkHxT1+l4N
+ZHGT71zS5vq7pUrwWURlcy4mwOvNG0VA7BSu/j2mCAH2iUiRMEYOnZWEZTT9rS0
woDFAtU0Yp/zE6FhnXK0iwPyTfv9lJaOLpf30QnT3rc14t1sGhs460Hzv6XUbgjA
Z89M5J+ImESPr3S1P7Tw39giD8LRsuXCqX8Hh3blz8astlrp9G+vmH/oN7U/yo9j
uaGuwytV5aJuDDyl6tiMPz4nl537fxawdn95Mm9R67F1glESkEUob8ua2PRJDDCl
5ZPkTRwrIMyf2yS9ggvml2AsJbKUEs7pHxuzSpf9f/0ac5vBSwlXgLiEsq91uDxj
TkEoXa/UKXyjDqnp4I/ctiwAopcp51Dvmsi2eiLKKxlS8XHWUZxVTSToqcGbj3OU
isUqzGXEpvRgvC7u7oFS7FvSX+rBR0+H4iXq8MwCZvgfLldCyLQ=
=5+D+
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 4847-1] connman security update, Salvatore Bonaccorso, 08.02.2021
Archiv bereitgestellt durch MHonArc 2.6.24.