drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in p11-kit
Name: |
Mehrere Probleme in p11-kit |
|
ID: |
DSA-4822-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian buster |
|
Datum: |
Fr, 1. Januar 2021, 17:45 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363 |
|
Applikationen: |
p11-kit |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4822-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 01, 2021 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : p11-kit CVE ID : CVE-2020-29361 CVE-2020-29362 CVE-2020-29363
David Cook reported several memory safety issues affecting the RPC protocol in p11-kit, a library providing a way to load and enumerate PKCS#11 modules.
For the stable distribution (buster), these problems have been fixed in version 0.23.15-2+deb10u1.
We recommend that you upgrade your p11-kit packages.
For the detailed security status of p11-kit please refer to its security tracker page at: https://security-tracker.debian.org/tracker/p11-kit
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl/uyMNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RuRQ/+OOn59gJBnV0cOS4x/form65EYRvQEEY9r35HYAFGYnu/m0C9J6+89K+2 BKyGaApSH4+6Er7YC4ieRy3U+bZAhHJru44hi5vUI5Hl6p/nLQz0XLC5wJB6Y3mB PoNlqSaT6NDLLgig/eTZcGDL6nuwrZ1r3iL1SSf70NdJ6UqvwyiJTB4I1RjYwilQ SxcW2PrbZU/ZRRP8YfGR0n9YKYM04YK8v7SklhRyMB4+GAcE/YPpVlUSwKq4dCmJ 2Cz6fzHdL36guGKxo5E9CLEqWY0+R99rvaWU1NZp90QIw0HzBkG/4Ofrk1cW7Iny /MIkpGWYc4Fe3JVAV+n3TijuAQ72HtU/XXTEMjOCKR7TtLJlXt1pSEkv3AHdGHth XXI+jajF/ACFIa+wnSurwMimd2aeiiZNSL59bk6zZw+9Rix0396B3IUQuJrdnZhA YD6P70b4jGyqM8sHH9kAhym7aPFH6KVjp2ievMgxktK4FLcDcE+K8ElT3TjQmyzZ 1Rsgxa0IIL/ej512MRFugPNCVmFym7ZmN7edApMuqgOv4eNvAIqvGtbTsm3Vp5YY nULpe5iNooWEcEs5tn5CX/dgK7/RKV0I+1Matfd4tb7nVEd9o1doYDe/9ldRO1UH nCpaIbr5dlohLZ4OHl8nwZqyENQF59TEdhnbXTSci+WX+MU9Iyw= =d5SK -----END PGP SIGNATURE-----
|
|
|
|