it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5153-1] trafficserver security update
- Date: Mon, 30 May 2022 18:01:41 +0000
- List-archive: https://lists.debian.org/msgid-search/20220530180141.GA26662 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=XUYMDFb3YKShtDt0xMiugSb6bQ7PXtrjLDWq1wkLE8o=; b=rV wUHywCZayHypGyh7iKzjoCn4r5Wq3JA3IaL6s4qCK89Am+osA8t38v5I2AHSC2zSzw5zcUPau6MMc hYBhbkuRtmrL+8uwACQygSOoF0+gBpFX6u+m+s1nTUPLpvPxNxuHhYIS0LS0xvv28BaQxGrioZmkP PhSchQnnp6w0hIGqODEjvuAXZoMLz+kctTw+Ww9BUuHyd6H0reNNk8Mzc9kAsHQHednnzy4goK3lK pLKkOWCBR9LcMqYyXWM3i7sfl8nmchgaS2nviM8xvsKsVKQ6l0f/hVbwdkV8pil5NOBpwURsF+0NI pI+dzHygVzy9ivUovGF1ueHyp1CQ1rTg==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 30 May 2022 18:01:55 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <Qj7bvjM0jgI.A.e4C.TaQliB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5153-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 30, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : trafficserver
CVE ID : CVE-2021-37147 CVE-2021-37148 CVE-2021-37149 CVE-2021-38161
CVE-2021-44040 CVE-2021-44759
Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server, which could result in HTTP request
smuggling or MITM attacks.
For the oldstable distribution (buster), these problems have been fixed
in version 8.0.2+ds-1+deb10u6.
For the stable distribution (bullseye), these problems have been fixed in
version 8.1.1+ds-1.1+deb11u1.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Dsxv
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5153-1] trafficserver security update, Moritz Muehlenhoff, 30.05.2022
Archiv bereitgestellt durch MHonArc 2.6.24.