what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5041-1

Debian Security Advisory 5041-1
Posted Jan 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5041-1 - Multiple vulnerabilities were discovered in Cloudflare's RPKI validator, which could result in denial of service or path traversal.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2021-3761, CVE-2021-3907, CVE-2021-3908, CVE-2021-3909, CVE-2021-3910, CVE-2021-3911, CVE-2021-3912, CVE-2021-43173, CVE-2021-43174
SHA-256 | 6501077000a8d7bd5cc465108de012893b05f400bec7e3756eb05f619b4e0f8e

Debian Security Advisory 5041-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5041-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 11, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : cfrpki
CVE ID : CVE-2021-3761 CVE-2021-3907 CVE-2021-3908 CVE-2021-3909
CVE-2021-3910 CVE-2021-3911 CVE-2021-3912 CVE-2021-43173
CVE-2021-43174

Multiple vulnerabilities were discovered in Cloudflare's RPKI validator,
which could result in denial of service or path traversal.

For the stable distribution (bullseye), these problems have been fixed in
version 1.4.2-1~deb11u1.

We recommend that you upgrade your cfrpki packages.

For the detailed security status of cfrpki please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cfrpki

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=n8pD
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close