it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5111-1] zlib security update
- Date: Fri, 01 Apr 2022 15:20:47 +0000
- List-archive: https://lists.debian.org/msgid-search/E1naJ4x-0002vy-8s AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version :Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=Qa6UVDWdOdPzgIZuv+rcD4XQHuC+r7KKWZw23/eEm4M=; b=oV uybqoEuWF+77jZatTJNeXlgYt+BU0hvWSnZZC2vWmWKyqxCzw8zKg3da6bK5Lx/Dq/BemZ5LFP0hQ s/xi58LcD3vd/GBXph0cXODvzv56V68QebcV/G51FgnrJPq4sFsB2Y57DRm6cLoYi350gQLLDF7ya dxDth+1nURIs3baYWA6Xn/hy6TQQtQ5g1Lm+EteKLpjYLelbeWIqvWhNNs9IP6fGEdweYAgeu40IV GN2aNqSLgNajWm77C4wLSYEu2bn4esJH+SEllAj4RiGPE+q0tSNG3f7kn8+FV74rap2b0iq5tW0CB IxgG7BoSYiJ+1c3G4/9QCcjAMqwHzhag==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 1 Apr 2022 15:21:03 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <fjPn_k5e-ZI.A.f2H.fhxRiB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5111-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 01, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : zlib
CVE ID : CVE-2018-25032
Debian Bug : 1008265
Danilo Ramos discovered that incorrect memory handling in zlib's deflate
handling could result in denial of service or potentially the execution
of arbitrary code if specially crafted input is processed.
For the oldstable distribution (buster), this problem has been fixed
in version 1:1.2.11.dfsg-1+deb10u1.
For the stable distribution (bullseye), this problem has been fixed in
version 1:1.2.11.dfsg-2+deb11u1.
We recommend that you upgrade your zlib packages.
For the detailed security status of zlib please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/zlib
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=NzmF
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5111-1] zlib security update, Salvatore Bonaccorso, 01.04.2022
Archiv bereitgestellt durch MHonArc 2.6.24.