drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Fehlerhafte Zugriffsrechte in hyperkitty
Name: |
Fehlerhafte Zugriffsrechte in hyperkitty |
|
ID: |
DSA-4922-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
So, 30. Mai 2021, 00:44 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33038 |
|
Applikationen: |
hyperkitty |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4922-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff May 29, 2021 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : hyperkitty CVE ID : CVE-2021-33038
Amir Sarabadani and Kunal Mehta discovered that the import functionality of Hyperkitty, the web user interface to access Mailman 3 archives, did not restrict the visibility of private archives during the import, i.e. that during the import of a private Mailman 2 archive the archive was publicly accessible until the import completed.
For the stable distribution (buster), this problem has been fixed in version 1.2.2-1+deb10u1.
We recommend that you upgrade your hyperkitty packages.
For the detailed security status of hyperkitty please refer to its security tracker page at: https://security-tracker.debian.org/tracker/hyperkitty
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmCyGwMACgkQEMKTtsN8 TjYNeA//aKIOxYnECImzLoOsdq7bZ0EkklzMOExDUDj5YkPuyoU5u4UXT3ulllAL sd2q8PHw1SNp873juSEYTI9nqnHf8VmnL9oRp1Wr7MIVT6pxIOUhGQZCx4nMEih8 ovF9ZrSeyGeZH3jEUp+P1N9LNlEPHqLXb5xIRmDgv/WdBhZklBdGAzXqQ2A2bBpa QiOoE5K25F3n/66PuPhzbiYnjmdvbTWOVJO0mma4d0ITHRED+tTGTQyG6sDEi+mo 83LNdAh/Ytvo3M5AODiJn/EUMnzegBydMp758QFLuvheTkw1e1QuPQk1M3Y9nHw/ DMOyR8rwSEUl1REDVZTol2RTX83HH7wRiLNK4ImTqJkzbV2+1cE2Kfg/0T4CX1FH Wuey7dhLusOlkkSpL6T8xRI2rwV6xDkLM7sYspzn7JTHzRjkqDPjEafOBXvNekvu VIGaIdZpDPQ6C3S82VtMwInDfCh8mxjj2JcZgxj0QJTVwYJZI072P3BbMoiwA/ce WJGOtebbtxpizjmxCOQaSgnC5dow8oH/5lIVu30z09+j1cke8SCCrYmN8FxIs3Qi nrjX+yCnZ2JSrX1L1o59WWaQkeEcRwvNwF+ggaQbt+NmFXVxBlUGCu1qd9y/IWMj KtB5440D+dmxiZaUoltZ+84zU5HHoqi+1nE3k0Nkj64LS5vY+iA= =uZSt -----END PGP SIGNATURE-----
|
|
|
|