diff options
author | Adrian Bunk <bunk@debian.org> | 2020-08-10 12:17:41 +0300 |
---|---|---|
committer | Adrian Bunk <bunk@debian.org> | 2020-08-10 12:17:41 +0300 |
commit | 37c88782bee48e63b6884a7024e47e3f4c917fa9 (patch) | |
tree | 84369a3576abec73b27e22e4e2c391fb53661e1d | |
parent | 8a959add8722d189dd440041dee1ee80b7028811 (diff) |
DLA-2320-1 did not require the gosu rebuild
-rw-r--r-- | english/lts/security/2020/dla-2320.wml | 4 | ||||
-rw-r--r-- | french/lts/security/2020/dla-2320.wml | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/english/lts/security/2020/dla-2320.wml b/english/lts/security/2020/dla-2320.wml index e2931aba927..eaeb272e824 100644 --- a/english/lts/security/2020/dla-2320.wml +++ b/english/lts/security/2020/dla-2320.wml @@ -1,11 +1,11 @@ <define-tag description>LTS security update</define-tag> <define-tag moreinfo> -<p>A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. gosu and runc have been rebuilt with the fixed package.</p> +<p>A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. runc has been rebuilt with the fixed package.</p> <p>For Debian 9 stretch, this problem has been fixed in version 0.0~git20150813.0.1b506fc-2+deb9u1.</p> -<p>We recommend that you upgrade your golang-github-seccomp-libseccomp-golang, gosu and runc packages.</p> +<p>We recommend that you upgrade your golang-github-seccomp-libseccomp-golang and runc packages, and recompile own Go code using golang-github-seccomp-libseccomp-golang.</p> <p>For the detailed security status of golang-github-seccomp-libseccomp-golang please refer to its security tracker page at: diff --git a/french/lts/security/2020/dla-2320.wml b/french/lts/security/2020/dla-2320.wml index fa65020b645..88aa56f186d 100644 --- a/french/lts/security/2020/dla-2320.wml +++ b/french/lts/security/2020/dla-2320.wml @@ -3,13 +3,13 @@ <define-tag moreinfo> <p>Un processus exécuté à travers un filtre restrictif seccomp spécifiant plusieurs arguments d’appel système pouvait contourner les restrictions d’accès prévues -en indiquant un seul argument de correspondance. Les paquets gosu et runc ont +en indiquant un seul argument de correspondance. Les paquets runc ont été reconstruits avec le paquet corrigé.</p> <p>Pour Debian 9 <q>Stretch</q>, ce problème a été corrigé dans la version 0.0~git20150813.0.1b506fc-2+deb9u1.</p> -<p>Nous vous recommandons de mettre à jour vos paquets golang-github-seccomp-libseccomp-golang, gosu et runc.</p> +<p>Nous vous recommandons de mettre à jour vos paquets golang-github-seccomp-libseccomp-golang et runc.</p> <p>Pour disposer d'un état détaillé sur la sécurité de golang-github-seccomp-libseccomp-golang, veuillez consulter sa page de suivi de sécurité à l'adresse : |