From 37c88782bee48e63b6884a7024e47e3f4c917fa9 Mon Sep 17 00:00:00 2001 From: Adrian Bunk Date: Mon, 10 Aug 2020 12:17:41 +0300 Subject: DLA-2320-1 did not require the gosu rebuild --- english/lts/security/2020/dla-2320.wml | 4 ++-- french/lts/security/2020/dla-2320.wml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/english/lts/security/2020/dla-2320.wml b/english/lts/security/2020/dla-2320.wml index e2931aba927..eaeb272e824 100644 --- a/english/lts/security/2020/dla-2320.wml +++ b/english/lts/security/2020/dla-2320.wml @@ -1,11 +1,11 @@ LTS security update -

A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. gosu and runc have been rebuilt with the fixed package.

+

A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. runc has been rebuilt with the fixed package.

For Debian 9 stretch, this problem has been fixed in version 0.0~git20150813.0.1b506fc-2+deb9u1.

-

We recommend that you upgrade your golang-github-seccomp-libseccomp-golang, gosu and runc packages.

+

We recommend that you upgrade your golang-github-seccomp-libseccomp-golang and runc packages, and recompile own Go code using golang-github-seccomp-libseccomp-golang.

For the detailed security status of golang-github-seccomp-libseccomp-golang please refer to its security tracker page at: diff --git a/french/lts/security/2020/dla-2320.wml b/french/lts/security/2020/dla-2320.wml index fa65020b645..88aa56f186d 100644 --- a/french/lts/security/2020/dla-2320.wml +++ b/french/lts/security/2020/dla-2320.wml @@ -3,13 +3,13 @@

Un processus exécuté à travers un filtre restrictif seccomp spécifiant plusieurs arguments d’appel système pouvait contourner les restrictions d’accès prévues -en indiquant un seul argument de correspondance. Les paquets gosu et runc ont +en indiquant un seul argument de correspondance. Les paquets runc ont été reconstruits avec le paquet corrigé.

Pour Debian 9 Stretch, ce problème a été corrigé dans la version 0.0~git20150813.0.1b506fc-2+deb9u1.

-

Nous vous recommandons de mettre à jour vos paquets golang-github-seccomp-libseccomp-golang, gosu et runc.

+

Nous vous recommandons de mettre à jour vos paquets golang-github-seccomp-libseccomp-golang et runc.

Pour disposer d'un état détaillé sur la sécurité de golang-github-seccomp-libseccomp-golang, veuillez consulter sa page de suivi de sécurité à l'adresse : -- cgit v1.2.3