it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5247-1] barbican security update
- Date: Tue, 4 Oct 2022 19:09:49 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; dmarc=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 2001:41b8:202:deb:216:36ff:fe40:4002) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"
- List-archive: https://lists.debian.org/msgid-search/YzyE/Z1ScK33NN83 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=lmv/i7Yhf/rskHfMyq6NkOf+fvUmZqdQjdrTnH5x3XE=; b=sG TB8uUceuIYkfEn9i3bx1D3VXm8XBA9VwSbQL27+q2vHjpw0nwzoOXRH/5cKile6Stt+BtQjxIb5db 3w9FbPYBMhD5zLxh//y7/HpKhif+Yi/TuMDbLguNF7NhXAU6M4modsz9cnNSO8OlwJLELmcscEbGc Nv7j4guOt+FY8HGyQZQt22IZrARmFlPo0UQE/Yvtp9lfFIS5n3CWEqqKXDjmqbPq6Gj0XCAdnmF3y rkGG8RZe/pN48yZxoR3pB1ujt27m5l9INmaEu2NaaSz3Ct5x9ulz5lfTcYlktcCk7Fv/CAE3s4cuR pRT9bSwsUZAcXpEjh90MsWrtXdcucF/w==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Tue, 4 Oct 2022 19:10:16 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <apSOzoaIp6D.A.RjG.XUIPjB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5247-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 04, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : barbican
CVE ID : CVE-2022-3100
Debian Bug : 1021139
Douglas Mendizabal discovered that Barbican, the OpenStack Key Management
Service, incorrectly parsed requests which could allow an authenticated
user to bypass Barbican access policies.
For the stable distribution (bullseye), this problem has been fixed in
version 1:11.0.0-3+deb11u1.
We recommend that you upgrade your barbican packages.
For the detailed security status of barbican please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/barbican
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=mpgp
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5247-1] barbican security update, Moritz Muehlenhoff, 04.10.2022
Archiv bereitgestellt durch MHonArc 2.6.24.