Path: ...!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!bofh.it!news.nic.it!robomod From: Moritz Muehlenhoff Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5338-1] cinder security update Date: Wed, 01 Feb 2023 19:50:01 +0100 Message-ID: X-Original-To: debian-security-announce@lists.debian.org X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Wed Feb 1 18:34:23 2023 Old-Return-Path: X-Amavis-Spam-Status: No, score=-113.391 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=JhmarhQrm7rLJgAJ5Bwa86FY0+ONI7YF9KdtEG57ZFY=; b=tp +L/8gLyhkYhxLiGaLblp+gvsAtBftXtxxwC88r5lcjtQgfnnee2BtSvT/9qwfvv7TSKAczEwQhvJG vh58dnDSsYciOEFldmoqyKj9NxZnflPRICtopmE5ovmQNIMejr8/T5u071dTDhvDYeM4grUJBLgkW E8x+CT2Hh6cnkMRGwhOA0yPPs/fzPXuvmesh/9PAscWKr2oeFslMQU0LUrCh3QFomDM+mhwQdmB5X zCXKfHwUokVa1p2lH3GOtY6KaNtyogg7m00WYMOGo6wx/gvCaTKnil4ttndH9BOKfjoAtjVxWpMoc VWL/RqlyhkKi9EpzAitUwjkZYipNRyWg==; MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4238 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/Y9qwlbGYFwu6BZ8c@seger.debian.org Approved: robomod@news.nic.it Lines: 48 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Wed, 1 Feb 2023 18:33:57 +0000 X-Original-Message-ID: Bytes: 4526 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5338-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff February 01, 2023 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : cinder CVE ID : CVE-2022-47951 Debian Bug : 1029562 Guillaume Espanel, Pierre Libeau, Arnaud Morin and Damien Rannou discovered that missing input sanitising in the handling of VMDK images in Cinder, the OpenStack block storage system, may result in information disclosure. For the stable distribution (bullseye), this problem has been fixed in version 2:17.0.1-1+deb11u1. We recommend that you upgrade your cinder packages. For the detailed security status of cinder please refer to its security tracker page at: https://security-tracker.debian.org/tracker/cinder Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmParskACgkQEMKTtsN8 TjbMhxAAvApHGxPkLq1ldUi5fgMjTloVBouyRJS/Ytsq3p5U0Yx98SvnPI9ab9nL RlWdVBjpdy9Wb6l0ouhaiiLR2kPJEv9D2Ux7oWdHpvexdtYs9eHdgx7Ym6Zibu6d /7hMgxPaG8zKEwJLCf2zuMqXbr6l55ht+DAmFJrzO/VyQyU2mlhkSXvCdmL9NAX+ csEEW4WtLjx1MPD1gFz99uI3Q6DY3kTBu45BWG2xKkU0hHThsap0kRRK+6M9QINj W2zylsyhW2pB5/0j5X8bUgMX9jDFNMj9p5tWcpN2FwQa6YvKQoIONHSNJIXEaOsH iMXRQUGytS8UwW9UfDiPLzsKSreoaOaWzbtkvQvGrfauHmbySrVjZ2WCq+ZNiFGI JV7EhlJstFi3IwlJ3oYlZgUHlLusNGahqQo+KD18ipVPiSE89LIM9Zq+p7KpjLLT zjlSMgC7gLj4IJmCDRfxz7uxR0fUg/o9w0nhQNAr63hKbjzeJWDmRGQwpsuh/DBL R7AgwwuqiMkpBj27uPMD/aPFisLysP8xmO7IJobfuZzdXU+mCQg0fbwMWWF3JQHc ew971YDoreBB73Su9NsMVWrSgUd2WC4axp+EPFQTHNas6OLM+oEhpK/dUILczzy/ h9jPzH4wDAmQgv0nSOZSqGu7cuXSxsSGCzf8J8hpYoeysRn91Gc= =NXlC -----END PGP SIGNATURE-----