drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in zookeeper
Name: |
Denial of Service in zookeeper |
|
ID: |
DSA-3871-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie |
|
Datum: |
Do, 1. Juni 2017, 23:42 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637 |
|
Applikationen: |
zookeeper |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3871-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff June 01, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : zookeeper CVE ID : CVE-2017-5637
It was discovered that Zookeeper, a service for maintaining configuration information, didn't restrict access to the computationally expensive wchp/wchc commands which could result in denial of service by elevated CPU consumption.
This update disables those two commands by default. The new configuration option "4lw.commands.whitelist" can be used to whitelist commands selectively (and the full set of commands can be restored with '*')
For the stable distribution (jessie), this problem has been fixed in version 3.4.5+dfsg-2+deb8u2.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your zookeeper packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlkwgEQACgkQEMKTtsN8 TjZPOhAAiE0OXE0lZ/Ldp2/bMOTstcEru0ubR+XwOjegoesJR66rlzcSzGJfNXSy q8BsS663U9rEFEH1QG6vrKF+Lbo2JKn7TmQUmgbrYWEn46Ul+Z0ZH7fNV0Hy9+Su xrk+lSwU5Uu48ZE0rtYzrX67ucFZtn7k9bJtbBpfm/QEcKsHv/B1A5sXIiZKn/yR /TdptpA3XuNmK9mrT6Zi2MvJwTUM2OI7F9rEoGxCcNovnOtyR3JxMafiMsDT4Sg3 fjw6yzzyCIkO13lqor1P8aJl7FqFgFZo9vSFmN0lqRZ14J83tB88thl/UX2h0Hp0 f70/icSD7V+K21+NQrQG31r9r/78g9c0E834uvMEp4kFAaGpfZBpXmZ02lvL/uaV H59vZiap+Yx3Xpw9NGmUutnbC+HHa/Pm+C6ciCCSynG7Yt9TeBCXoaHScV/Fp8So YmBAA7qnTHLR49jg0AKVJ4jCOSWDSrFpCT+sosbK6hWFMMLiLQuka/DhiyU+QlQw F6nRpokZ7YMlT0w1vEqmZ7hPwkCaQ0NTVttIBHBen0HlcXLqpBUa8RKYhkWlJXnY EcUKxTJqylqk1W4ee9SzuEy9D4UOvB0BF+Dio9WwuEkDx9oPeNbiNzP2gtE0NNXZ 1DFvO6ZPCz8JWaRTie/yO2ZAw1IVsWpqlhTCXLaDOTDTL5cZX8Y= =bMii -----END PGP SIGNATURE-----
|
|
|
|