it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5568-1] fastdds security update
- Date: Mon, 27 Nov 2023 19:20:37 +0000
- List-archive: https://lists.debian.org/msgid-search/ZWTsBcZQpG8V1xy2 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=HjSipwyjpdjVlkICCb2vKAbeGaWTGdZf6U+5PaVQn/g=; b=M1 xCf0jX8u+JNfTAxnPD5amONr77s1f7p1DgDXP1enMzg1Lr81VbiWuVihIKKeAtSBaMztdvOJV7PQU VPvevrmGQtdaiCYuCpvfw42z39Qjg11WH/RZqC8iN7hWcJe5GwjVLiwRahfKIKxzcQwxmdaNyTSws TIvZxdL+bTRmLvmn8DP3S44PJ3EPbxTptp+IFwXrcAdmROzku47h5qqOlS/nnIXf2G1g0Cg5IidI2 YC6ZjrQS/L0zU3qzLrxzuIXme0H9kd+pyUpFFGXITjsLvTlVnJ3ysYumlnTAQAJLW7M2zpbf//94t bImU7oBQHFORefQeErm7oswuEIY1Y7Ng==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 27 Nov 2023 19:21:06 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <9CrS2qOngDN.A.n0E.hwOZlB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5568-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 27, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : fastdds
CVE ID : CVE-2023-42459
Debian Bug : 1054163
It was discovered that incorrect memory management in Fast DDS, a C++
implementation of the DDS (Data Distribution Service) might result in
denial of service.
The oldstable distribution (bullseye) is not affected.
For the stable distribution (bookworm), this problem has been fixed in
version 2.9.1+ds-1+deb12u2.
We recommend that you upgrade your fastdds packages.
For the detailed security status of fastdds please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/fastdds
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmVk6wsACgkQEMKTtsN8
Tja2FRAAqpa1Zek52KcYiyQSucpEe6ZLajVfzKeGKvieFrfcf491GDYno3sQhF5w
2uWRyZ3I1OjJk9uuFWj4ql2IwNs3nudefqR8OCEQk4oSZfnWBX4UWTMiuCncE1+g
YobKkoWlGDGjpS36lT/GX+L9nfq46ERgZYPqQJjLb6xU+vJzGMo29LVGVDliF4VX
5n7DZlVbnAWb+swXPp0sIIV/F5EPpdgbygisPSAVynCxF4eFqxQfiCOpkXkBdzKF
27RSsJQJggfDaXiz11t8zkhWWJQU3pDyrRn79NfkyXc0IPNH4q2C0+vQZ4bHQLFD
8NuoQqZ5Olqx9Z742z8+jXWpphP7nvEcEhItNFnZNE3EBqJ8T8Aum1NWC4vRSQIR
8G/Ii9pd8dU7yTBGNbTSqyM8yTzMu4oEuvT309YVC4q3E2P51ZwUpgr7edPZRsXy
+T8DgzVGgyB+iSVhxmmlUK0encc9O3JfVb0a8mCfM2DUSICJCTkXPYpZB5N4En57
g8P/AF2u74Rq/y/SFwoJAZyE789wXDQOLTZJSQBmFbCSL+mLNe/8W8ZAl75TS2fE
2YulahAVceLuy64TLXnOGNHmUiWFeoSY7Ad/NSQyjpCssPP7VcC5sJC94YgEsFey
2/0mf72nviY4cT5K7D8f2cVnTR74Tc4ICVxbe2SMect/x8IRP/E=
=eh2N
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5568-1] fastdds security update, Moritz Muehlenhoff, 27.11.2023
Archiv bereitgestellt durch MHonArc 2.6.19+.