drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in memcached
Name: |
Mehrere Probleme in memcached |
|
ID: |
DSA-3704-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie |
|
Datum: |
Do, 3. November 2016, 22:38 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704 |
|
Applikationen: |
memcached |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3704-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 03, 2016 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : memcached CVE ID : CVE-2016-8704 CVE-2016-8705 CVE-2016-8706 Debian Bug : 842811 842812 842814
Aleksandar Nikolic of Cisco Talos discovered several integer overflow vulnerabilities in memcached, a high-performance memory object caching system. A remote attacker can take advantage of these flaws to cause a denial of service (daemon crash), or potentially to execute arbitrary code.
For the stable distribution (jessie), these problems have been fixed in version 1.4.21-1.1+deb8u1.
We recommend that you upgrade your memcached packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQJ8BAEBCgBmBQJYG2EHXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ0NjQ0NDA5ODA4QzE3MUUwNTUzMURERUUw NTRDQjhGMzEzNDNDRjQ0AAoJEAVMuPMTQ89EQJYQAISgPxtvSaIrF8h2cydS03Ix 9lh8A7t8+YVVXBsfaF8M+AIVoYjIpAI1WKJDHEOLfdUZwf7BKiDdkr5L9Oc94sgN tUg4NPDM88BdKDxDgcD9GVXwnM40ZE0bWYtEURxrgt8LtitOPXQCIkQsTEcp3Gkb IxRAasJAuad1pX2R3+RmLXf0QnRi77RIUrQMZSMsLnEXGB1yD6Wsmzd6HtuE4e5m LMbEo8/xNoNmJFYt2ezZYoYDRqoAvGBcBgaPQsi+zoWo8TCB4coK5J5Cz0N5UhDq 0CkP33gOhdko+VZb771ck/V2Opqlm/YdGdNJ7pxICINOs074ochVFz11NsWQmfRD 0JGSCFitsbkigGLEuC9P5Zyn5zKDC6o1XvqrI+eQeqbiGxS8zUDSymL+VUWVnsc1 co6TKcgmAA5djBixlQrtkkMWru6uxBqs/7tiJU7j8Z3QTbi8b+X4moEOF9OX2LWT jzg0E7l3jujgSdkjjfX7gPl03SxqrRfxiWbdsYXiWAQlkzFT/Uhvo5kHF6gLMUmX XkfsaTRVw9obbtdEq9OXLjQEUkFDDKyfly3aS4WMHZFV87IV16h7Jds4iIdE6Vwv WEMC9gAo0koFLB1C3AbjN/vpRDxPPNZid+RKNKv/PYZDMMAd9uRNv+itkIg5Dd1z BbRGrPSfuPtZ4Y7bGF7c =gl5N -----END PGP SIGNATURE-----
|
|
|
|