it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5638-1] libuv1 security update
- Date: Sun, 10 Mar 2024 13:01:58 +0000
- List-archive: https://lists.debian.org/msgid-search/E1rjIoQ-00ERJx-E2 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=adjhv4WOk60I+UQYBPR/04DMVaMOBwRvwgkwpZU9K4g=; b=Cm CV1NOrN+IB+Hsr/iSaZIrvBXaGkC43RhN40zdzkhY3ioXTe2TfPxOAPpHi8xRd7MrbUsEYs1wys6q HrWgm8WU6VmNBk8M9UtgRmiyTjO3Nbu8rwYlat6QtR/WyJg4GV+L0izlD7xXBXWzgylbFA0To18nb lmT4BfKAVVuOxa+q//pJEe1hfuivNO03rlkKy5r0QK3u1G84aSaIYAa5h6q0AdBcaUxBwKu9QWZFy 4sto0IVmkYqtmv5GqIa9//Ia9WgYrey+KZFVI2sH/31bI2lk3cpDeDYtsj1fMsncaJ/gKLGwVZucW L96deMq7X0hv9WhKRXcbyLf+ewqzOVAA==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Sun, 10 Mar 2024 13:02:23 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <_XvJ5fC1LoC.A.hhG.f9a7lB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5638-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 10, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libuv1
CVE ID : CVE-2024-24806
Debian Bug : 1063484
It was discovered that the uv_getaddrinfo() function in libuv, an
asynchronous event notification library, incorrectly truncated certain
hostnames, which may result in bypass of security measures on internal
APIs or SSRF attacks.
For the oldstable distribution (bullseye), this problem has been fixed
in version 1.40.0-2+deb11u1.
For the stable distribution (bookworm), this problem has been fixed in
version 1.44.2-1+deb12u1.
We recommend that you upgrade your libuv1 packages.
For the detailed security status of libuv1 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libuv1
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=ai3N
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5638-1] libuv1 security update, Salvatore Bonaccorso, 10.03.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.