it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 4864-1] python-aiohttp security update
- Date: Sat, 27 Feb 2021 08:32:19 +0000
- List-archive: https://lists.debian.org/msgid-search/E1lFv1P-0000In-3o AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=58j549WbB0MdYkEYN+KXuNzQPkgZaQZhwLEPpDYgmqk=; b=JZ p4IAE3+FYyLx4QUkzsIu7D9ocfn004+xc0iOr0e4bhDzKBuRkDbM4a3bMeHt/ByMtsps1vsMzUgdY HJAsZYTY2TnsAF/5LNNoe8HxX9/dj672X7+NharLFJ3SZfcFQY7eYYFVHVitlLyCQOBjMrJSjed3v jZK1zp5VPWEN7g9DFZ4SHcNsiAmZKaCukjT4Qa+t4wpykwgFTu+yrBwTG+kRKTE4r+5KoC4RuqMXB coUwdi+eZlmEAYNOI5yc+au0jf4NgW4cd2EoRWS3ofGMDILaxcOeJrL2MdP4XbycJbGIVw4SQllab XN4lJurPnxADdwdlJeYx/2BdJoWxCOrg==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Sat, 27 Feb 2021 08:32:38 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <wjYCLvU4k0M.A.nWD.mOgOgB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4864-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 27, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : python-aiohttp
CVE ID : CVE-2021-21330
Beast Glatisant and Jelmer Vernooij reported that python-aiohttp, a
async HTTP client/server framework, is prone to an open redirect
vulnerability. A maliciously crafted link to an aiohttp-based web-server
could redirect the browser to a different website.
For the stable distribution (buster), this problem has been fixed in
version 3.5.1-1+deb10u1.
We recommend that you upgrade your python-aiohttp packages.
For the detailed security status of python-aiohttp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/python-aiohttp
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=HxQn
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 4864-1] python-aiohttp security update, Salvatore Bonaccorso, 27.02.2021
Archiv bereitgestellt durch MHonArc 2.6.24.