it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5669-1] guix security update
- Date: Mon, 22 Apr 2024 07:34:24 +0000
- List-archive: https://lists.debian.org/msgid-search/ZiYTAPwF5CZgZaSP AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=sIQyOZMK/Ti3uWkrZxmEXddUmgCrADAZ7/3r4+uj0NY=; b=Wh QlS/bslt1kKSsGEaKT1ADdAN+JsyAEhVuAKTPUi32b19Xz0ZkAbHXdNHq91xxgYQ4pfNZPzLs0YvC x7n3iFdz+0YXZ3nxP5WH0pEg9Sj9PRdex1rB8JckUw74hF6qPGubvVfgxRvKwEZX7z2WZoomdaqmV fiRHZUs+ZsppXXG65sqQkB8a2MnyWf7e7od0N05kQCQXB7rAJgURwqtaAXGpowmlFWKMYDWSY0nHO 1XsrgZKL++VdWLfcnAEhP5RoHAG1q1z3aiXAPeoXl7iii76md7rKwlqkli0Telt4jPuh6UmVER5E4 uCNkbhFEtDZ27R7t5NfR0ry9DucmILKA==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 22 Apr 2024 07:34:53 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <Dbyucvh-oFO.A.WfF.dMhJmB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5669-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 22, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : guix
CVE ID : CVE-2024-27297
It was discovered that insufficient restriction of unix daemon sockets
in the GNU Guix functional package manager could result in sandbox
bypass.
For the oldstable distribution (bullseye), this problem has been fixed
in version 1.2.0-4+deb11u2.
For the stable distribution (bookworm), this problem has been fixed in
version 1.4.0-3+deb12u1.
We recommend that you upgrade your guix packages.
For the detailed security status of guix please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/guix
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmYmEj0ACgkQEMKTtsN8
TjadOg//QNwxj1LaUW92byZO1DaMWzwnPElHIwwgTUIWj2NCxZQbumPb6PF0AnYq
n15GcHY1y3jvJ9VnvLI7uns82Gtjqhr9m/sfrDnX/9JPlLBNXTdjQ3/mpECUp6aU
BvN+kmw4irmsfXqtWR33nrdxID+/mCuDfDHM0Cl64JSbrntqOhpRbkML3DNOdWs0
h6BeIhFRoGkLLzh2M8U9uyivrLwrlf8ONem4kmn0xtRowc2Y/0GSg/fJIJPwR3/K
j8FmuydKkm3oVNITr2z2f+b9mzSxXbC7tOgoA6o7Vuxc3Ha7cGn9DojFWKV5DCPv
VFMKjeos9ELIetmSA/GtSMqTn5rV2QlRWHvUnxtGTyewHsz4j/cXXo5F59f+t2zB
LZ8aAlzbM5c5/ZVhQVNnuzY8ueaPkOAyFkdawPjSTis0S0KYjgz9/4F8peYNEyJ7
GUgS2b9aXp3j1dLPKjXDXHXUNL3quemK3aUZCZElgsGN6oHZnOvf/t04jL9BN0/o
gL7wShs2ZsS/AQ7HRQ+OuYTTcs8patbgitCKI74u8oS/ArrG/U4TfgKhwqFaAICX
x5cJFreSKzhTQWIhGaxPY73s1zDy5KyLBQjQ67DPbqqYcCC0SwrUFegYrOllORnj
TLlkkG7vkelx/PxYqzy+YrWeoHt/jdSTR8j5bn1XEYPa/4MZrIg=
=0oSL
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5669-1] guix security update, Moritz Muehlenhoff, 22.04.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.