it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5062-1] nss security update
- Date: Tue, 25 Jan 2022 22:06:08 +0000
- List-archive: https://lists.debian.org/msgid-search/E1nCTx2-0002O0-Lq AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=7RiM6DtopcpDNQN2kay90PQzcDA4vgFIdOSLYI31Rfk=; b=GX NSQktAZ7ZmqLIPtjDazHfC+Esg40K2+NQ4uUFkgH3I4rg2YFG2/ar7dzZU5J9OjUAtUTvLioQytpc /Q2rhXn8Pdgy1ptAKJzUler7Ua6KoKRNs4dicpnFAUpI3cgwh5T/VtdeXNZ0A/XhmDha7uI6aTwLV aqXDgcmQZg/Halmkk0KiOEvBnvdh8c50suA/QY+DF79vro4y67CDeVcutXSBT44TlsiCHMTOwIocO 9qsT6URPL/bjRDx2Qx9ZrdduSEGDBkwbK6RyTEhcqXrvwBtabhdKs3+KApaQZwcYb5nFmHTlm9Q91 kwhyO68Nux1A+CSw9cMosbdZUH0K4NpA==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Tue, 25 Jan 2022 22:06:24 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <BjjBqVjOOWK.A.arH.gRH8hB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5062-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 25, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : nss
CVE ID : CVE-2022-22747
Tavis Ormandy discovered that incorrect parsing of pkcs7 sequences in
nss, the Mozilla Network Security Service library, may result in denial
of service.
For the oldstable distribution (buster), this problem has been fixed
in version 2:3.42.1-1+deb10u5.
For the stable distribution (bullseye), this problem has been fixed in
version 2:3.61-1+deb11u2.
We recommend that you upgrade your nss packages.
For the detailed security status of nss please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/nss
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=635D
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5062-1] nss security update, Salvatore Bonaccorso, 25.01.2022
Archiv bereitgestellt durch MHonArc 2.6.24.