it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5239-1] gdal security update
- Date: Tue, 27 Sep 2022 20:57:35 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
- List-archive: https://lists.debian.org/msgid-search/E1odHe3-009heY-2Z AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=n6YBqP2dFMy7OfN2b6njbg/9DAUvOB5cMlb6HmQ+wGo=; b=FZ 8OO8AQYJv+oKcmCIgJNxw5cJpxkkvGs2br7JGvyXj2GTrUBwJ64vXmbL8e2kMcE0sSg3f7FFUq6EF jKx+50XhrFqP8xMLUMdtZub/Kulm5IvwEicxrF7FKilgswhuEUF+PnfyAxCx4GWzhd0Tfu1o+QFNq U2UQpESsbighshf8LVOfOUlZXjXCeS07FCskI0xpyGNtdrRQkfAIbdWN2i8s9ADag4USZZoYua1I/ txYd+37Hj1DpHK9FOzoiIHf7RB0PqDcQ0/Qh5ze0MrFHg38ZVEpSRMKi2e83ZuMHWZXj4nxkWkAq5 MRNI2bdiieBrmCPprI5W+BYIfPRRQaAA==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Tue, 27 Sep 2022 20:57:58 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <DGaMcIoK18L.A.5iG.WP2MjB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5239-1 security AT debian.org
https://www.debian.org/security/ Aron Xu
September 27, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : gdal
CVE ID : CVE-2021-45943
A heap-based buffer overflow vulnerability was discovered in gdal, a
Geospatial Data Abstraction Library, which could result in denial of
service or potentially the execution of arbitrary code, if a specially
crafted file is processed with the PCIDSK driver.
For the stable distribution (bullseye), this problem has been fixed in
version 3.2.2+dfsg-2+deb11u2.
We recommend that you upgrade your gdal packages.
For the detailed security status of gdal please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/gdal
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=GY76
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5239-1] gdal security update, Salvatore Bonaccorso, 27.09.2022
Archiv bereitgestellt durch MHonArc 2.6.24.