lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 11 Jun 2019 22:39:12 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4461-1] zookeeper security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4461-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
June 12, 2019                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : zookeeper
CVE ID         : CVE-2019-0201

Harrison Neil discovered that the getACL() command in Zookeeper, a
service for maintaining configuration information, did not validate
permissions, which could result in information disclosure.

For the stable distribution (stretch), this problem has been fixed in
version 3.4.9-3+deb9u2.

We recommend that you upgrade your zookeeper packages.

For the detailed security status of zookeeper please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/zookeeper

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=FrNf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ