lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 4 Sep 2019 07:08:37 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4514-1] varnish security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4514-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 04, 2019                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : varnish
CVE ID         : CVE-2019-15892

Alf-Andre Walla discovered a remotely triggerable assert in the Varnish
web accelerator; sending a malformed HTTP request could result in denial
of service.

The oldstable distribution (stretch) is not affected.

For the stable distribution (buster), this problem has been fixed in
version 6.1.1-1+deb10u1.

We recommend that you upgrade your varnish packages.

For the detailed security status of varnish please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/varnish

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=ju9A
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ