it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5048-1] libreswan security update
- Date: Sat, 15 Jan 2022 19:41:40 +0000
- List-archive: https://lists.debian.org/msgid-search/E1n8ovk-00040k-6T AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=g/AwnoiR1/nS6fFkLLRINqztX+h+DDncpQ50XrSxOCg=; b=W2 FeGIrsMCjC/s567+DqhpixdndHeTV8QHxZWxZzTv/x4W44JZxSF/lpsvBbsqWXLVxqTbLZniBXh7U i7B11HN0GhTe71LDAMEnO1FVNQVIWD+G4e/KYPt9SWspjRcvvIHpKs5KAqUDAdWgBwdS02ih97g2J +5IsEharHzpnOmYOh9T7Yihe2jy7/hcBz+h/i/6EVozqXsjljw5DH8Yk6zOxGJMNOeKc+McOH0W6t W1tw5qvsKO+XroDvCOiwMrH59OPSvNInHYCu989xH2zw/k+cB0KfO24anP8MKzSS6+UzmL9btC3dV iPq9j6NJswUkFZ+pNORrY0WWEmoZcezA==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Sat, 15 Jan 2022 19:41:59 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <eqlfNbClCZK.A.FPC.HOy4hB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5048-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 15, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libreswan
CVE ID : CVE-2022-23094
It was discovered that the libreswan IPsec implementation could be
forced into a crash/restart via a malformed IKEv1 packet, resulting in
denial of service.
For the stable distribution (bullseye), this problem has been fixed in
version 4.3-1+deb11u1.
We recommend that you upgrade your libreswan packages.
For the detailed security status of libreswan please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libreswan
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=zKmQ
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5048-1] libreswan security update, Salvatore Bonaccorso, 15.01.2022
Archiv bereitgestellt durch MHonArc 2.6.24.